Guest User

SQLi Sites & Vulnerabilities "marussiamotors.ru"

a guest
Jun 5th, 2012
319
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 82.75 KB | None | 0 0
  1. SQLi Sites & Vulnerabilities "marussiamotors.ru"
  2. ------------------------------------------------
  3.  
  4. <ROOT>
  5. - <SiteVulList>
  6. - <VulRow>
  7. <ReferURL>http://www.panicd.com/store.php?t=U&s=1</ReferURL>
  8. <Parameter>s=1</Parameter>
  9. <Type>Integer</Type>
  10. <KWordActionURL>Memberships</KWordActionURL>
  11. <Vulnerability>URL SQL INJECTION</Vulnerability>
  12. </VulRow>
  13. - <VulRow>
  14. <ReferURL>http://www.panicd.com/store.php?t=U&s=99999999</ReferURL>
  15. <Parameter>s=99999999</Parameter>
  16. <Type>Integer</Type>
  17. <KWordActionURL>Memberships</KWordActionURL>
  18. <Vulnerability>URL SQL INJECTION</Vulnerability>
  19. </VulRow>
  20. - <VulRow>
  21. <ReferURL>http://www.panicd.com/index.php</ReferURL>
  22. <Parameter>srch</Parameter>
  23. <Type>GET</Type>
  24. <KWordActionURL>http://www.panicd.com/main.php?srch=WCRTESTINPUT000000<>%3c%3e%253c%253e&Submit=Search&p=49</KWordActionURL>
  25. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  26. </VulRow>
  27. - <VulRow>
  28. <ReferURL>http://www.panicd.com/main.php?p=1</ReferURL>
  29. <Parameter>p=1</Parameter>
  30. <Type>Integer</Type>
  31. <KWordActionURL>Paranomal</KWordActionURL>
  32. <Vulnerability>URL SQL INJECTION</Vulnerability>
  33. </VulRow>
  34. - <VulRow>
  35. <ReferURL>http://www.panicd.com/main.php?p=99999999</ReferURL>
  36. <Parameter>p=99999999</Parameter>
  37. <Type>Integer</Type>
  38. <KWordActionURL>Paranomal</KWordActionURL>
  39. <Vulnerability>URL SQL INJECTION</Vulnerability>
  40. </VulRow>
  41. - <VulRow>
  42. <ReferURL>http://www.panicd.com/location.php?ln=1108</ReferURL>
  43. <Parameter>ln=1108</Parameter>
  44. <Type>Integer</Type>
  45. <KWordActionURL>Music</KWordActionURL>
  46. <Vulnerability>URL SQL INJECTION</Vulnerability>
  47. </VulRow>
  48. - <VulRow>
  49. <ReferURL>http://www.panicd.com/location.php?ln=99999999</ReferURL>
  50. <Parameter>ln=99999999</Parameter>
  51. <Type>Integer</Type>
  52. <KWordActionURL>Spanish</KWordActionURL>
  53. <Vulnerability>URL SQL INJECTION</Vulnerability>
  54. </VulRow>
  55. - <VulRow>
  56. <ReferURL>http://www.panicd.com/store.php?t=C&s=1&c=34</ReferURL>
  57. <Parameter>c=34</Parameter>
  58. <Type>Integer</Type>
  59. <KWordActionURL>Membership</KWordActionURL>
  60. <Vulnerability>URL SQL INJECTION</Vulnerability>
  61. </VulRow>
  62. - <VulRow>
  63. <ReferURL>http://www.panicd.com/store.php?t=C&s=1&c=99999999</ReferURL>
  64. <Parameter>c=99999999</Parameter>
  65. <Type>Integer</Type>
  66. <KWordActionURL>Dance</KWordActionURL>
  67. <Vulnerability>URL SQL INJECTION</Vulnerability>
  68. </VulRow>
  69. - <VulRow>
  70. <ReferURL>http://www.panicd.com/store.php?t=FP&store=99999999</ReferURL>
  71. <Parameter>store=99999999</Parameter>
  72. <Type>String</Type>
  73. <KWordActionURL>shopping</KWordActionURL>
  74. <Vulnerability>URL SQL INJECTION</Vulnerability>
  75. </VulRow>
  76. - <VulRow>
  77. <ReferURL>http://www.panicd.com/wsms/wsms-ecomm-login-process.php^pw=WCRTESTINPUT000001&store=1&Submit2=Log In&email=1</ReferURL>
  78. <Parameter>email=1</Parameter>
  79. <Type>Integer</Type>
  80. <KWordActionURL>Returning</KWordActionURL>
  81. <Vulnerability>POST SQL INJECTION</Vulnerability>
  82. </VulRow>
  83. - <VulRow>
  84. <ReferURL>http://www.panicd.com/wsms/wsms-ecomm-login-process.php^pw=WCRTESTINPUT000001&store=1&Submit2=Log In&email=99999999</ReferURL>
  85. <Parameter>email=99999999</Parameter>
  86. <Type>Integer</Type>
  87. <KWordActionURL>STARTED</KWordActionURL>
  88. <Vulnerability>POST SQL INJECTION</Vulnerability>
  89. </VulRow>
  90. - <VulRow>
  91. <ReferURL>http://www.panicd.com/store.php?t=U&s=</ReferURL>
  92. <Parameter>pw=99999999</Parameter>
  93. <Type>String</Type>
  94. <KWordActionURL>http://www.panicd.com/wsms/wsms-ecomm-login-process.php^store=2&Submit2=Log In&email=WCRTESTINPUT000000&pw=99999999</KWordActionURL>
  95. <Vulnerability>XPath INJECTION</Vulnerability>
  96. </VulRow>
  97. - <VulRow>
  98. <ReferURL>http://www.panicd.com/wsms/wsms-ecomm-login-process.php^Submit2=Log In&email=WCRTESTINPUT000000&pw=WCRTESTINPUT000001&store=2</ReferURL>
  99. <Parameter>store=2</Parameter>
  100. <Type>Integer</Type>
  101. <KWordActionURL>Shirts</KWordActionURL>
  102. <Vulnerability>POST SQL INJECTION</Vulnerability>
  103. </VulRow>
  104. - <VulRow>
  105. <ReferURL>http://www.panicd.com/articles/^feed=rss2</ReferURL>
  106. <Parameter>feed=rss2</Parameter>
  107. <Type>String</Type>
  108. <KWordActionURL>PANICd</KWordActionURL>
  109. <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
  110. </VulRow>
  111. - <VulRow>
  112. <ReferURL>http://www.panicd.com/articles/wp-login.php?action=99999999</ReferURL>
  113. <Parameter>action=99999999</Parameter>
  114. <Type>Integer</Type>
  115. <KWordActionURL>PANICd</KWordActionURL>
  116. <Vulnerability>URL SQL INJECTION</Vulnerability>
  117. </VulRow>
  118. - <VulRow>
  119. <ReferURL>http://www.panicd.com/articles/wp-trackback.php?p=73</ReferURL>
  120. <Parameter>p=73</Parameter>
  121. <Type>Integer</Type>
  122. <KWordActionURL>Member</KWordActionURL>
  123. <Vulnerability>URL SQL INJECTION</Vulnerability>
  124. </VulRow>
  125. - <VulRow>
  126. <ReferURL>http://www.panicd.com/articles/?m=201205</ReferURL>
  127. <Parameter>m=201205</Parameter>
  128. <Type>String</Type>
  129. <KWordActionURL>laquo</KWordActionURL>
  130. <Vulnerability>URL SQL INJECTION</Vulnerability>
  131. </VulRow>
  132. - <VulRow>
  133. <ReferURL>http://www.panicd.com/articles/^author=1</ReferURL>
  134. <Parameter>author=1</Parameter>
  135. <Type>Integer</Type>
  136. <KWordActionURL>PANICd</KWordActionURL>
  137. <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
  138. </VulRow>
  139. - <VulRow>
  140. <ReferURL>http://www.bulldogsupporters.com/events/../locations/detail.php?locationID=3</ReferURL>
  141. <Parameter>locationID=3</Parameter>
  142. <Type>Integer</Type>
  143. <KWordActionURL>Bulldog</KWordActionURL>
  144. <Vulnerability>URL SQL INJECTION</Vulnerability>
  145. </VulRow>
  146. - <VulRow>
  147. <ReferURL>http://www.bulldogsupporters.com/events/../events/index.php?filter=99999999</ReferURL>
  148. <Parameter>filter=99999999</Parameter>
  149. <Type>Integer</Type>
  150. <KWordActionURL>Bulldog</KWordActionURL>
  151. <Vulnerability>URL SQL INJECTION</Vulnerability>
  152. </VulRow>
  153. - <VulRow>
  154. <ReferURL>http://www.bulldogsupporters.com/events/../locations/detail.php?locationID=99999999</ReferURL>
  155. <Parameter>locationID=99999999</Parameter>
  156. <Type>Integer</Type>
  157. <KWordActionURL>Bulldog</KWordActionURL>
  158. <Vulnerability>URL SQL INJECTION</Vulnerability>
  159. </VulRow>
  160. - <VulRow>
  161. <ReferURL>http://www.bulldogsupporters.com/events/detail.php?eventID=109</ReferURL>
  162. <Parameter>eventID=109</Parameter>
  163. <Type>Integer</Type>
  164. <KWordActionURL>Bulldog</KWordActionURL>
  165. <Vulnerability>URL SQL INJECTION</Vulnerability>
  166. </VulRow>
  167. - <VulRow>
  168. <ReferURL>http://www.bulldogsupporters.com/events/detail.php?eventID=99999999</ReferURL>
  169. <Parameter>eventID=99999999</Parameter>
  170. <Type>Integer</Type>
  171. <KWordActionURL>Bulldog</KWordActionURL>
  172. <Vulnerability>URL SQL INJECTION</Vulnerability>
  173. </VulRow>
  174. - <VulRow>
  175. <ReferURL>http://www.bulldogsupporters.com/events/index.php?filter=99999999</ReferURL>
  176. <Parameter>filter=99999999</Parameter>
  177. <Type>Integer</Type>
  178. <KWordActionURL>Bulldog</KWordActionURL>
  179. <Vulnerability>URL SQL INJECTION</Vulnerability>
  180. </VulRow>
  181. - <VulRow>
  182. <ReferURL>http://www.bulldogsupporters.com/events/location.php?locationID=3</ReferURL>
  183. <Parameter>locationID=3</Parameter>
  184. <Type>Integer</Type>
  185. <KWordActionURL>Bulldog</KWordActionURL>
  186. <Vulnerability>URL SQL INJECTION</Vulnerability>
  187. </VulRow>
  188. - <VulRow>
  189. <ReferURL>http://www.bulldogsupporters.com/events/location.php?locationID=99999999</ReferURL>
  190. <Parameter>locationID=99999999</Parameter>
  191. <Type>Integer</Type>
  192. <KWordActionURL>Bulldog</KWordActionURL>
  193. <Vulnerability>URL SQL INJECTION</Vulnerability>
  194. </VulRow>
  195. - <VulRow>
  196. <ReferURL>http://www.bulldogsupporters.com/blogs/article.php?blogID=152</ReferURL>
  197. <Parameter>blogID=152</Parameter>
  198. <Type>Integer</Type>
  199. <KWordActionURL>Bulldog</KWordActionURL>
  200. <Vulnerability>URL SQL INJECTION</Vulnerability>
  201. </VulRow>
  202. - <VulRow>
  203. <ReferURL>http://www.bulldogsupporters.com/blogs/article.php?blogID=99999999</ReferURL>
  204. <Parameter>blogID=99999999</Parameter>
  205. <Type>Integer</Type>
  206. <KWordActionURL>Bulldog</KWordActionURL>
  207. <Vulnerability>URL SQL INJECTION</Vulnerability>
  208. </VulRow>
  209. - <VulRow>
  210. <ReferURL>http://www.bulldogsupporters.com/locations/detail.php?locationID=1</ReferURL>
  211. <Parameter>locationID=1</Parameter>
  212. <Type>Integer</Type>
  213. <KWordActionURL>Bulldog</KWordActionURL>
  214. <Vulnerability>URL SQL INJECTION</Vulnerability>
  215. </VulRow>
  216. - <VulRow>
  217. <ReferURL>http://www.bulldogsupporters.com/locations/detail.php?locationID=99999999</ReferURL>
  218. <Parameter>locationID=99999999</Parameter>
  219. <Type>Integer</Type>
  220. <KWordActionURL>Bulldog</KWordActionURL>
  221. <Vulnerability>URL SQL INJECTION</Vulnerability>
  222. </VulRow>
  223. - <VulRow>
  224. <ReferURL>http://www.bulldogsupporters.com/news/article.php?newsID=44</ReferURL>
  225. <Parameter>newsID=44</Parameter>
  226. <Type>Integer</Type>
  227. <KWordActionURL>Bulldog</KWordActionURL>
  228. <Vulnerability>URL SQL INJECTION</Vulnerability>
  229. </VulRow>
  230. - <VulRow>
  231. <ReferURL>http://www.bulldogsupporters.com/news/article.php?newsID=99999999</ReferURL>
  232. <Parameter>newsID=99999999</Parameter>
  233. <Type>Integer</Type>
  234. <KWordActionURL>Bulldog</KWordActionURL>
  235. <Vulnerability>URL SQL INJECTION</Vulnerability>
  236. </VulRow>
  237. - <VulRow>
  238. <ReferURL>http://www.bulldogsupporters.com/events/index.php?order=99999999</ReferURL>
  239. <Parameter>order=99999999</Parameter>
  240. <Type>Integer</Type>
  241. <KWordActionURL>Bulldog</KWordActionURL>
  242. <Vulnerability>URL SQL INJECTION</Vulnerability>
  243. </VulRow>
  244. - <VulRow>
  245. <ReferURL>http://www.bulldogsupporters.com/about/../locations/detail.php?locationID=3</ReferURL>
  246. <Parameter>locationID=3</Parameter>
  247. <Type>Integer</Type>
  248. <KWordActionURL>Bulldog</KWordActionURL>
  249. <Vulnerability>URL SQL INJECTION</Vulnerability>
  250. </VulRow>
  251. - <VulRow>
  252. <ReferURL>http://www.bulldogsupporters.com/about/../locations/detail.php?locationID=99999999</ReferURL>
  253. <Parameter>locationID=99999999</Parameter>
  254. <Type>Integer</Type>
  255. <KWordActionURL>Bulldog</KWordActionURL>
  256. <Vulnerability>URL SQL INJECTION</Vulnerability>
  257. </VulRow>
  258. - <VulRow>
  259. <ReferURL>http://www.bulldogsupporters.com/about/../events/index.php?filter=99999999</ReferURL>
  260. <Parameter>filter=99999999</Parameter>
  261. <Type>Integer</Type>
  262. <KWordActionURL>Bulldog</KWordActionURL>
  263. <Vulnerability>URL SQL INJECTION</Vulnerability>
  264. </VulRow>
  265. - <VulRow>
  266. <ReferURL>http://www.bulldogsupporters.com/news/../locations/detail.php?locationID=3</ReferURL>
  267. <Parameter>locationID=3</Parameter>
  268. <Type>Integer</Type>
  269. <KWordActionURL>Bulldog</KWordActionURL>
  270. <Vulnerability>URL SQL INJECTION</Vulnerability>
  271. </VulRow>
  272. - <VulRow>
  273. <ReferURL>http://www.bulldogsupporters.com/news/../locations/detail.php?locationID=99999999</ReferURL>
  274. <Parameter>locationID=99999999</Parameter>
  275. <Type>Integer</Type>
  276. <KWordActionURL>Bulldog</KWordActionURL>
  277. <Vulnerability>URL SQL INJECTION</Vulnerability>
  278. </VulRow>
  279. - <VulRow>
  280. <ReferURL>http://www.bulldogsupporters.com/news/../events/index.php?filter=99999999</ReferURL>
  281. <Parameter>filter=99999999</Parameter>
  282. <Type>Integer</Type>
  283. <KWordActionURL>Bulldog</KWordActionURL>
  284. <Vulnerability>URL SQL INJECTION</Vulnerability>
  285. </VulRow>
  286. - <VulRow>
  287. <ReferURL>http://www.bulldogsupporters.com/news/index.php?order=99999999</ReferURL>
  288. <Parameter>order=99999999</Parameter>
  289. <Type>Integer</Type>
  290. <KWordActionURL>Bulldog</KWordActionURL>
  291. <Vulnerability>URL SQL INJECTION</Vulnerability>
  292. </VulRow>
  293. - <VulRow>
  294. <ReferURL>http://www.bulldogsupporters.com/blogs/../events/index.php?filter=99999999</ReferURL>
  295. <Parameter>filter=99999999</Parameter>
  296. <Type>Integer</Type>
  297. <KWordActionURL>Bulldog</KWordActionURL>
  298. <Vulnerability>URL SQL INJECTION</Vulnerability>
  299. </VulRow>
  300. - <VulRow>
  301. <ReferURL>http://www.bulldogsupporters.com/blogs/../locations/detail.php?locationID=3</ReferURL>
  302. <Parameter>locationID=3</Parameter>
  303. <Type>Integer</Type>
  304. <KWordActionURL>Bulldog</KWordActionURL>
  305. <Vulnerability>URL SQL INJECTION</Vulnerability>
  306. </VulRow>
  307. - <VulRow>
  308. <ReferURL>http://www.bulldogsupporters.com/blogs/../locations/detail.php?locationID=99999999</ReferURL>
  309. <Parameter>locationID=99999999</Parameter>
  310. <Type>Integer</Type>
  311. <KWordActionURL>Bulldog</KWordActionURL>
  312. <Vulnerability>URL SQL INJECTION</Vulnerability>
  313. </VulRow>
  314. - <VulRow>
  315. <ReferURL>http://www.bulldogsupporters.com/blogs/index.php?order=99999999</ReferURL>
  316. <Parameter>order=99999999</Parameter>
  317. <Type>Integer</Type>
  318. <KWordActionURL>Bulldog</KWordActionURL>
  319. <Vulnerability>URL SQL INJECTION</Vulnerability>
  320. </VulRow>
  321. - <VulRow>
  322. <ReferURL>http://www.bulldogsupporters.com/members/detail.php^appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0&mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=1</ReferURL>
  323. <Parameter>appCity=1</Parameter>
  324. <Type>String</Type>
  325. <KWordActionURL>Bulldog</KWordActionURL>
  326. <Vulnerability>POST SQL INJECTION</Vulnerability>
  327. </VulRow>
  328. - <VulRow>
  329. <ReferURL>http://www.bulldogsupporters.com/events/../members/signup.php</ReferURL>
  330. <Parameter>appLastName</Parameter>
  331. <Type>POST</Type>
  332. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000004<>%3c%3e%253c%253e&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  333. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  334. </VulRow>
  335. - <VulRow>
  336. <ReferURL>http://www.bulldogsupporters.com/events/../members/signup.php</ReferURL>
  337. <Parameter>appCity</Parameter>
  338. <Type>POST</Type>
  339. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000006<>%3c%3e%253c%253e&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  340. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  341. </VulRow>
  342. - <VulRow>
  343. <ReferURL>http://www.bulldogsupporters.com/events/../members/signup.php</ReferURL>
  344. <Parameter>appState</Parameter>
  345. <Type>POST</Type>
  346. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=WCRTESTINPUT000029<>%3c%3e%253c%253e&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  347. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  348. </VulRow>
  349. - <VulRow>
  350. <ReferURL>http://www.bulldogsupporters.com/blogs/../members/signup.php</ReferURL>
  351. <Parameter>appMobilePhone</Parameter>
  352. <Type>POST</Type>
  353. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000009<>%3c%3e%253c%253e&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  354. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  355. </VulRow>
  356. - <VulRow>
  357. <ReferURL>http://www.bulldogsupporters.com/blogs/../members/signup.php</ReferURL>
  358. <Parameter>appFavNation</Parameter>
  359. <Type>POST</Type>
  360. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000014<>%3c%3e%253c%253e&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  361. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  362. </VulRow>
  363. - <VulRow>
  364. <ReferURL>http://www.bulldogsupporters.com/news/../members/signup.php</ReferURL>
  365. <Parameter>appFirstName</Parameter>
  366. <Type>POST</Type>
  367. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000003<>%3c%3e%253c%253e&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  368. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  369. </VulRow>
  370. - <VulRow>
  371. <ReferURL>http://www.bulldogsupporters.com/news/../members/signup.php</ReferURL>
  372. <Parameter>appHomePhone</Parameter>
  373. <Type>POST</Type>
  374. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000010<>%3c%3e%253c%253e&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  375. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  376. </VulRow>
  377. - <VulRow>
  378. <ReferURL>http://www.bulldogsupporters.com/news/../members/signup.php</ReferURL>
  379. <Parameter>appFavClub</Parameter>
  380. <Type>POST</Type>
  381. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000013<>%3c%3e%253c%253e&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  382. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  383. </VulRow>
  384. - <VulRow>
  385. <ReferURL>http://www.bulldogsupporters.com/about/../members/signup.php</ReferURL>
  386. <Parameter>appZip</Parameter>
  387. <Type>POST</Type>
  388. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000007<>%3c%3e%253c%253e&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  389. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  390. </VulRow>
  391. - <VulRow>
  392. <ReferURL>http://www.bulldogsupporters.com/about/../members/signup.php</ReferURL>
  393. <Parameter>appNotes</Parameter>
  394. <Type>POST</Type>
  395. <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000023<>%3c%3e%253c%253e&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
  396. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  397. </VulRow>
  398. - <VulRow>
  399. <ReferURL>http://www.bulldogsupporters.com/locations/../locations/detail.php?locationID=3</ReferURL>
  400. <Parameter>locationID=3</Parameter>
  401. <Type>Integer</Type>
  402. <KWordActionURL>Bulldog</KWordActionURL>
  403. <Vulnerability>URL SQL INJECTION</Vulnerability>
  404. </VulRow>
  405. - <VulRow>
  406. <ReferURL>http://www.bulldogsupporters.com/locations/../locations/detail.php?locationID=99999999</ReferURL>
  407. <Parameter>locationID=99999999</Parameter>
  408. <Type>Integer</Type>
  409. <KWordActionURL>Bulldog</KWordActionURL>
  410. <Vulnerability>URL SQL INJECTION</Vulnerability>
  411. </VulRow>
  412. - <VulRow>
  413. <ReferURL>http://www.bulldogsupporters.com/locations/../events/index.php?filter=99999999</ReferURL>
  414. <Parameter>filter=99999999</Parameter>
  415. <Type>Integer</Type>
  416. <KWordActionURL>Bulldog</KWordActionURL>
  417. <Vulnerability>URL SQL INJECTION</Vulnerability>
  418. </VulRow>
  419. - <VulRow>
  420. <ReferURL>http://www.bulldogsupporters.com/bsgfc/../events/index.php?filter=99999999</ReferURL>
  421. <Parameter>filter=99999999</Parameter>
  422. <Type>Integer</Type>
  423. <KWordActionURL>Bulldog</KWordActionURL>
  424. <Vulnerability>URL SQL INJECTION</Vulnerability>
  425. </VulRow>
  426. - <VulRow>
  427. <ReferURL>http://www.bulldogsupporters.com/bsgfc/../locations/detail.php?locationID=3</ReferURL>
  428. <Parameter>locationID=3</Parameter>
  429. <Type>Integer</Type>
  430. <KWordActionURL>Bulldog</KWordActionURL>
  431. <Vulnerability>URL SQL INJECTION</Vulnerability>
  432. </VulRow>
  433. - <VulRow>
  434. <ReferURL>http://www.bulldogsupporters.com/bsgfc/index.php?order=date&filter=99999999</ReferURL>
  435. <Parameter>filter=99999999</Parameter>
  436. <Type>Integer</Type>
  437. <KWordActionURL>Bulldog</KWordActionURL>
  438. <Vulnerability>URL SQL INJECTION</Vulnerability>
  439. </VulRow>
  440. - <VulRow>
  441. <ReferURL>http://www.bulldogsupporters.com/bsgfc/../locations/detail.php?locationID=99999999</ReferURL>
  442. <Parameter>locationID=99999999</Parameter>
  443. <Type>Integer</Type>
  444. <KWordActionURL>Bulldog</KWordActionURL>
  445. <Vulnerability>URL SQL INJECTION</Vulnerability>
  446. </VulRow>
  447. - <VulRow>
  448. <ReferURL>http://www.bulldogsupporters.com/bsgfc/index.php?filter=game&order=99999999</ReferURL>
  449. <Parameter>order=99999999</Parameter>
  450. <Type>Integer</Type>
  451. <KWordActionURL>Bulldog</KWordActionURL>
  452. <Vulnerability>URL SQL INJECTION</Vulnerability>
  453. </VulRow>
  454. - <VulRow>
  455. <ReferURL>http://www.bulldogsupporters.com/bsgfc/../events/detail.php?eventID=159</ReferURL>
  456. <Parameter>eventID=159</Parameter>
  457. <Type>Integer</Type>
  458. <KWordActionURL>Bulldog</KWordActionURL>
  459. <Vulnerability>URL SQL INJECTION</Vulnerability>
  460. </VulRow>
  461. - <VulRow>
  462. <ReferURL>http://www.bulldogsupporters.com/bsgfc/../events/detail.php?eventID=99999999</ReferURL>
  463. <Parameter>eventID=99999999</Parameter>
  464. <Type>Integer</Type>
  465. <KWordActionURL>Bulldog</KWordActionURL>
  466. <Vulnerability>URL SQL INJECTION</Vulnerability>
  467. </VulRow>
  468. - <VulRow>
  469. <ReferURL>http://www.bulldogsupporters.com/join/../locations/detail.php?locationID=3</ReferURL>
  470. <Parameter>locationID=3</Parameter>
  471. <Type>Integer</Type>
  472. <KWordActionURL>Bulldog</KWordActionURL>
  473. <Vulnerability>URL SQL INJECTION</Vulnerability>
  474. </VulRow>
  475. - <VulRow>
  476. <ReferURL>http://www.bulldogsupporters.com/join/../locations/detail.php?locationID=99999999</ReferURL>
  477. <Parameter>locationID=99999999</Parameter>
  478. <Type>Integer</Type>
  479. <KWordActionURL>Bulldog</KWordActionURL>
  480. <Vulnerability>URL SQL INJECTION</Vulnerability>
  481. </VulRow>
  482. - <VulRow>
  483. <ReferURL>http://www.bulldogsupporters.com/join/../events/index.php?filter=99999999</ReferURL>
  484. <Parameter>filter=99999999</Parameter>
  485. <Type>Integer</Type>
  486. <KWordActionURL>Bulldog</KWordActionURL>
  487. <Vulnerability>URL SQL INJECTION</Vulnerability>
  488. </VulRow>
  489. - <VulRow>
  490. <ReferURL>http://www.bulldogsupporters.com/contact/../events/index.php?filter=99999999</ReferURL>
  491. <Parameter>filter=99999999</Parameter>
  492. <Type>Integer</Type>
  493. <KWordActionURL>Bulldog</KWordActionURL>
  494. <Vulnerability>URL SQL INJECTION</Vulnerability>
  495. </VulRow>
  496. - <VulRow>
  497. <ReferURL>http://www.bulldogsupporters.com/contact/../locations/detail.php?locationID=3</ReferURL>
  498. <Parameter>locationID=3</Parameter>
  499. <Type>Integer</Type>
  500. <KWordActionURL>Bulldog</KWordActionURL>
  501. <Vulnerability>URL SQL INJECTION</Vulnerability>
  502. </VulRow>
  503. - <VulRow>
  504. <ReferURL>http://www.bulldogsupporters.com/contact/../locations/detail.php?locationID=99999999</ReferURL>
  505. <Parameter>locationID=99999999</Parameter>
  506. <Type>Integer</Type>
  507. <KWordActionURL>Bulldog</KWordActionURL>
  508. <Vulnerability>URL SQL INJECTION</Vulnerability>
  509. </VulRow>
  510. - <VulRow>
  511. <ReferURL>http://www.bulldogsupporters.com/groups/../locations/detail.php?locationID=3</ReferURL>
  512. <Parameter>locationID=3</Parameter>
  513. <Type>Integer</Type>
  514. <KWordActionURL>Bulldog</KWordActionURL>
  515. <Vulnerability>URL SQL INJECTION</Vulnerability>
  516. </VulRow>
  517. - <VulRow>
  518. <ReferURL>http://www.bulldogsupporters.com/groups/../locations/detail.php?locationID=99999999</ReferURL>
  519. <Parameter>locationID=99999999</Parameter>
  520. <Type>Integer</Type>
  521. <KWordActionURL>Bulldog</KWordActionURL>
  522. <Vulnerability>URL SQL INJECTION</Vulnerability>
  523. </VulRow>
  524. - <VulRow>
  525. <ReferURL>http://www.bulldogsupporters.com/groups/../events/index.php?filter=99999999</ReferURL>
  526. <Parameter>filter=99999999</Parameter>
  527. <Type>Integer</Type>
  528. <KWordActionURL>Bulldog</KWordActionURL>
  529. <Vulnerability>URL SQL INJECTION</Vulnerability>
  530. </VulRow>
  531. - <VulRow>
  532. <ReferURL>http://www.bulldogsupporters.com/media/../events/index.php?filter=99999999</ReferURL>
  533. <Parameter>filter=99999999</Parameter>
  534. <Type>Integer</Type>
  535. <KWordActionURL>Bulldog</KWordActionURL>
  536. <Vulnerability>URL SQL INJECTION</Vulnerability>
  537. </VulRow>
  538. - <VulRow>
  539. <ReferURL>http://www.bulldogsupporters.com/media/../locations/detail.php?locationID=3</ReferURL>
  540. <Parameter>locationID=3</Parameter>
  541. <Type>Integer</Type>
  542. <KWordActionURL>Bulldog</KWordActionURL>
  543. <Vulnerability>URL SQL INJECTION</Vulnerability>
  544. </VulRow>
  545. - <VulRow>
  546. <ReferURL>http://www.bulldogsupporters.com/media/../locations/detail.php?locationID=99999999</ReferURL>
  547. <Parameter>locationID=99999999</Parameter>
  548. <Type>Integer</Type>
  549. <KWordActionURL>Bulldog</KWordActionURL>
  550. <Vulnerability>URL SQL INJECTION</Vulnerability>
  551. </VulRow>
  552. - <VulRow>
  553. <ReferURL>http://www.bulldogsupporters.com/media/gallery.php?galleryID=7</ReferURL>
  554. <Parameter>galleryID=7</Parameter>
  555. <Type>Integer</Type>
  556. <KWordActionURL>Bulldog</KWordActionURL>
  557. <Vulnerability>URL SQL INJECTION</Vulnerability>
  558. </VulRow>
  559. - <VulRow>
  560. <ReferURL>http://www.bulldogsupporters.com/media/gallery.php?galleryID=99999999</ReferURL>
  561. <Parameter>galleryID=99999999</Parameter>
  562. <Type>Integer</Type>
  563. <KWordActionURL>Bulldog</KWordActionURL>
  564. <Vulnerability>URL SQL INJECTION</Vulnerability>
  565. </VulRow>
  566. - <VulRow>
  567. <ReferURL>http://www.bulldogsupporters.com/season_tickets/../events/index.php?filter=99999999</ReferURL>
  568. <Parameter>filter=99999999</Parameter>
  569. <Type>Integer</Type>
  570. <KWordActionURL>Bulldog</KWordActionURL>
  571. <Vulnerability>URL SQL INJECTION</Vulnerability>
  572. </VulRow>
  573. - <VulRow>
  574. <ReferURL>http://www.bulldogsupporters.com/season_tickets/../locations/detail.php?locationID=3</ReferURL>
  575. <Parameter>locationID=3</Parameter>
  576. <Type>Integer</Type>
  577. <KWordActionURL>Bulldog</KWordActionURL>
  578. <Vulnerability>URL SQL INJECTION</Vulnerability>
  579. </VulRow>
  580. - <VulRow>
  581. <ReferURL>http://www.bulldogsupporters.com/season_tickets/../locations/detail.php?locationID=99999999</ReferURL>
  582. <Parameter>locationID=99999999</Parameter>
  583. <Type>Integer</Type>
  584. <KWordActionURL>Bulldog</KWordActionURL>
  585. <Vulnerability>URL SQL INJECTION</Vulnerability>
  586. </VulRow>
  587. - <VulRow>
  588. <ReferURL>http://www.bulldogsupporters.com/tickets/../events/index.php?filter=99999999</ReferURL>
  589. <Parameter>filter=99999999</Parameter>
  590. <Type>Integer</Type>
  591. <KWordActionURL>Bulldog</KWordActionURL>
  592. <Vulnerability>URL SQL INJECTION</Vulnerability>
  593. </VulRow>
  594. - <VulRow>
  595. <ReferURL>http://www.bulldogsupporters.com/tickets/../locations/detail.php?locationID=3</ReferURL>
  596. <Parameter>locationID=3</Parameter>
  597. <Type>Integer</Type>
  598. <KWordActionURL>Bulldog</KWordActionURL>
  599. <Vulnerability>URL SQL INJECTION</Vulnerability>
  600. </VulRow>
  601. - <VulRow>
  602. <ReferURL>http://www.bulldogsupporters.com/tickets/../locations/detail.php?locationID=99999999</ReferURL>
  603. <Parameter>locationID=99999999</Parameter>
  604. <Type>Integer</Type>
  605. <KWordActionURL>Bulldog</KWordActionURL>
  606. <Vulnerability>URL SQL INJECTION</Vulnerability>
  607. </VulRow>
  608. - <VulRow>
  609. <ReferURL>http://www.bulldogsupporters.com/buses/../events/index.php?filter=99999999</ReferURL>
  610. <Parameter>filter=99999999</Parameter>
  611. <Type>Integer</Type>
  612. <KWordActionURL>Bulldog</KWordActionURL>
  613. <Vulnerability>URL SQL INJECTION</Vulnerability>
  614. </VulRow>
  615. - <VulRow>
  616. <ReferURL>http://www.bulldogsupporters.com/buses/../locations/detail.php?locationID=3</ReferURL>
  617. <Parameter>locationID=3</Parameter>
  618. <Type>Integer</Type>
  619. <KWordActionURL>Bulldog</KWordActionURL>
  620. <Vulnerability>URL SQL INJECTION</Vulnerability>
  621. </VulRow>
  622. - <VulRow>
  623. <ReferURL>http://www.bulldogsupporters.com/buses/../locations/detail.php?locationID=99999999</ReferURL>
  624. <Parameter>locationID=99999999</Parameter>
  625. <Type>Integer</Type>
  626. <KWordActionURL>Bulldog</KWordActionURL>
  627. <Vulnerability>URL SQL INJECTION</Vulnerability>
  628. </VulRow>
  629. - <VulRow>
  630. <ReferURL>http://www.bulldogsupporters.com/tailgates/../locations/detail.php?locationID=3</ReferURL>
  631. <Parameter>locationID=3</Parameter>
  632. <Type>Integer</Type>
  633. <KWordActionURL>Bulldog</KWordActionURL>
  634. <Vulnerability>URL SQL INJECTION</Vulnerability>
  635. </VulRow>
  636. - <VulRow>
  637. <ReferURL>http://www.bulldogsupporters.com/tailgates/../events/index.php?filter=99999999</ReferURL>
  638. <Parameter>filter=99999999</Parameter>
  639. <Type>Integer</Type>
  640. <KWordActionURL>Bulldog</KWordActionURL>
  641. <Vulnerability>URL SQL INJECTION</Vulnerability>
  642. </VulRow>
  643. - <VulRow>
  644. <ReferURL>http://www.bulldogsupporters.com/tailgates/../locations/detail.php?locationID=99999999</ReferURL>
  645. <Parameter>locationID=99999999</Parameter>
  646. <Type>Integer</Type>
  647. <KWordActionURL>Bulldog</KWordActionURL>
  648. <Vulnerability>URL SQL INJECTION</Vulnerability>
  649. </VulRow>
  650. - <VulRow>
  651. <ReferURL>http://www.bulldogsupporters.com/chants/../events/index.php?filter=99999999</ReferURL>
  652. <Parameter>filter=99999999</Parameter>
  653. <Type>Integer</Type>
  654. <KWordActionURL>Bulldog</KWordActionURL>
  655. <Vulnerability>URL SQL INJECTION</Vulnerability>
  656. </VulRow>
  657. - <VulRow>
  658. <ReferURL>http://www.bulldogsupporters.com/chants/../locations/detail.php?locationID=3</ReferURL>
  659. <Parameter>locationID=3</Parameter>
  660. <Type>Integer</Type>
  661. <KWordActionURL>Bulldog</KWordActionURL>
  662. <Vulnerability>URL SQL INJECTION</Vulnerability>
  663. </VulRow>
  664. - <VulRow>
  665. <ReferURL>http://www.bulldogsupporters.com/chants/../locations/detail.php?locationID=99999999</ReferURL>
  666. <Parameter>locationID=99999999</Parameter>
  667. <Type>Integer</Type>
  668. <KWordActionURL>Bulldog</KWordActionURL>
  669. <Vulnerability>URL SQL INJECTION</Vulnerability>
  670. </VulRow>
  671. - <VulRow>
  672. <ReferURL>http://www.bulldogsupporters.com/chants/index.php?order=99999999</ReferURL>
  673. <Parameter>order=99999999</Parameter>
  674. <Type>Integer</Type>
  675. <KWordActionURL>Bulldog</KWordActionURL>
  676. <Vulnerability>URL SQL INJECTION</Vulnerability>
  677. </VulRow>
  678. - <VulRow>
  679. <ReferURL>http://www.bulldogsupporters.com/chants/detail.php?chantID=301</ReferURL>
  680. <Parameter>chantID=301</Parameter>
  681. <Type>Integer</Type>
  682. <KWordActionURL>Bulldog</KWordActionURL>
  683. <Vulnerability>URL SQL INJECTION</Vulnerability>
  684. </VulRow>
  685. - <VulRow>
  686. <ReferURL>http://www.bulldogsupporters.com/chants/detail.php?chantID=99999999</ReferURL>
  687. <Parameter>chantID=99999999</Parameter>
  688. <Type>Integer</Type>
  689. <KWordActionURL>Bulldog</KWordActionURL>
  690. <Vulnerability>URL SQL INJECTION</Vulnerability>
  691. </VulRow>
  692. - <VulRow>
  693. <ReferURL>http://www.bulldogsupporters.com/visiting_supporters/../events/index.php?filter=99999999</ReferURL>
  694. <Parameter>filter=99999999</Parameter>
  695. <Type>Integer</Type>
  696. <KWordActionURL>Bulldog</KWordActionURL>
  697. <Vulnerability>URL SQL INJECTION</Vulnerability>
  698. </VulRow>
  699. - <VulRow>
  700. <ReferURL>http://www.bulldogsupporters.com/visiting_supporters/../locations/detail.php?locationID=3</ReferURL>
  701. <Parameter>locationID=3</Parameter>
  702. <Type>Integer</Type>
  703. <KWordActionURL>Bulldog</KWordActionURL>
  704. <Vulnerability>URL SQL INJECTION</Vulnerability>
  705. </VulRow>
  706. - <VulRow>
  707. <ReferURL>http://www.bulldogsupporters.com/visiting_supporters/../locations/detail.php?locationID=99999999</ReferURL>
  708. <Parameter>locationID=99999999</Parameter>
  709. <Type>Integer</Type>
  710. <KWordActionURL>Bulldog</KWordActionURL>
  711. <Vulnerability>URL SQL INJECTION</Vulnerability>
  712. </VulRow>
  713. - <VulRow>
  714. <ReferURL>http://www.bulldogsupporters.com/tour2012/../events/index.php?filter=99999999</ReferURL>
  715. <Parameter>filter=99999999</Parameter>
  716. <Type>Integer</Type>
  717. <KWordActionURL>Bulldog</KWordActionURL>
  718. <Vulnerability>URL SQL INJECTION</Vulnerability>
  719. </VulRow>
  720. - <VulRow>
  721. <ReferURL>http://www.bulldogsupporters.com/tour2012/../locations/detail.php?locationID=3</ReferURL>
  722. <Parameter>locationID=3</Parameter>
  723. <Type>Integer</Type>
  724. <KWordActionURL>Bulldog</KWordActionURL>
  725. <Vulnerability>URL SQL INJECTION</Vulnerability>
  726. </VulRow>
  727. - <VulRow>
  728. <ReferURL>http://www.bulldogsupporters.com/tour2012/../locations/detail.php?locationID=99999999</ReferURL>
  729. <Parameter>locationID=99999999</Parameter>
  730. <Type>Integer</Type>
  731. <KWordActionURL>Bulldog</KWordActionURL>
  732. <Vulnerability>URL SQL INJECTION</Vulnerability>
  733. </VulRow>
  734. - <VulRow>
  735. <ReferURL>http://www.bulldogsupporters.com/tour2012/../events/detail.php?eventID=223</ReferURL>
  736. <Parameter>eventID=223</Parameter>
  737. <Type>Integer</Type>
  738. <KWordActionURL>Bulldog</KWordActionURL>
  739. <Vulnerability>URL SQL INJECTION</Vulnerability>
  740. </VulRow>
  741. - <VulRow>
  742. <ReferURL>http://www.bulldogsupporters.com/tour2012/../events/detail.php?eventID=99999999</ReferURL>
  743. <Parameter>eventID=99999999</Parameter>
  744. <Type>Integer</Type>
  745. <KWordActionURL>Bulldog</KWordActionURL>
  746. <Vulnerability>URL SQL INJECTION</Vulnerability>
  747. </VulRow>
  748. - <VulRow>
  749. <ReferURL>http://www.bulldogsupporters.com/southwest/../events/index.php?filter=99999999</ReferURL>
  750. <Parameter>filter=99999999</Parameter>
  751. <Type>Integer</Type>
  752. <KWordActionURL>Bulldog</KWordActionURL>
  753. <Vulnerability>URL SQL INJECTION</Vulnerability>
  754. </VulRow>
  755. - <VulRow>
  756. <ReferURL>http://www.bulldogsupporters.com/southwest/../locations/detail.php?locationID=3</ReferURL>
  757. <Parameter>locationID=3</Parameter>
  758. <Type>Integer</Type>
  759. <KWordActionURL>Bulldog</KWordActionURL>
  760. <Vulnerability>URL SQL INJECTION</Vulnerability>
  761. </VulRow>
  762. - <VulRow>
  763. <ReferURL>http://www.bulldogsupporters.com/southwest/../locations/detail.php?locationID=99999999</ReferURL>
  764. <Parameter>locationID=99999999</Parameter>
  765. <Type>Integer</Type>
  766. <KWordActionURL>Bulldog</KWordActionURL>
  767. <Vulnerability>URL SQL INJECTION</Vulnerability>
  768. </VulRow>
  769. - <VulRow>
  770. <ReferURL>http://www.bulldogsupporters.com/reservations/../locations/detail.php?locationID=3</ReferURL>
  771. <Parameter>locationID=3</Parameter>
  772. <Type>Integer</Type>
  773. <KWordActionURL>Bulldog</KWordActionURL>
  774. <Vulnerability>URL SQL INJECTION</Vulnerability>
  775. </VulRow>
  776. - <VulRow>
  777. <ReferURL>http://www.bulldogsupporters.com/reservations/../events/index.php?filter=99999999</ReferURL>
  778. <Parameter>filter=99999999</Parameter>
  779. <Type>Integer</Type>
  780. <KWordActionURL>Bulldog</KWordActionURL>
  781. <Vulnerability>URL SQL INJECTION</Vulnerability>
  782. </VulRow>
  783. - <VulRow>
  784. <ReferURL>http://www.bulldogsupporters.com/reservations/../locations/detail.php?locationID=99999999</ReferURL>
  785. <Parameter>locationID=99999999</Parameter>
  786. <Type>Integer</Type>
  787. <KWordActionURL>Bulldog</KWordActionURL>
  788. <Vulnerability>URL SQL INJECTION</Vulnerability>
  789. </VulRow>
  790. - <VulRow>
  791. <ReferURL>http://www.bulldogsupporters.com/dss/../events/index.php?filter=99999999</ReferURL>
  792. <Parameter>filter=99999999</Parameter>
  793. <Type>Integer</Type>
  794. <KWordActionURL>Bulldog</KWordActionURL>
  795. <Vulnerability>URL SQL INJECTION</Vulnerability>
  796. </VulRow>
  797. - <VulRow>
  798. <ReferURL>http://www.bulldogsupporters.com/dss/../locations/detail.php?locationID=3</ReferURL>
  799. <Parameter>locationID=3</Parameter>
  800. <Type>Integer</Type>
  801. <KWordActionURL>Bulldog</KWordActionURL>
  802. <Vulnerability>URL SQL INJECTION</Vulnerability>
  803. </VulRow>
  804. - <VulRow>
  805. <ReferURL>http://www.bulldogsupporters.com/dss/../locations/detail.php?locationID=99999999</ReferURL>
  806. <Parameter>locationID=99999999</Parameter>
  807. <Type>Integer</Type>
  808. <KWordActionURL>Bulldog</KWordActionURL>
  809. <Vulnerability>URL SQL INJECTION</Vulnerability>
  810. </VulRow>
  811. - <VulRow>
  812. <ReferURL>http://www.bulldogsupporters.com/members/../locations/detail.php?locationID=3</ReferURL>
  813. <Parameter>locationID=3</Parameter>
  814. <Type>Integer</Type>
  815. <KWordActionURL>Bulldog</KWordActionURL>
  816. <Vulnerability>URL SQL INJECTION</Vulnerability>
  817. </VulRow>
  818. - <VulRow>
  819. <ReferURL>http://www.bulldogsupporters.com/members/../locations/detail.php?locationID=99999999</ReferURL>
  820. <Parameter>locationID=99999999</Parameter>
  821. <Type>Integer</Type>
  822. <KWordActionURL>Bulldog</KWordActionURL>
  823. <Vulnerability>URL SQL INJECTION</Vulnerability>
  824. </VulRow>
  825. - <VulRow>
  826. <ReferURL>http://www.bulldogsupporters.com/members/../events/index.php?filter=99999999</ReferURL>
  827. <Parameter>filter=99999999</Parameter>
  828. <Type>Integer</Type>
  829. <KWordActionURL>Bulldog</KWordActionURL>
  830. <Vulnerability>URL SQL INJECTION</Vulnerability>
  831. </VulRow>
  832. - <VulRow>
  833. <ReferURL>http://www.bulldogsupporters.com/store/../events/index.php?filter=99999999</ReferURL>
  834. <Parameter>filter=99999999</Parameter>
  835. <Type>Integer</Type>
  836. <KWordActionURL>Bulldog</KWordActionURL>
  837. <Vulnerability>URL SQL INJECTION</Vulnerability>
  838. </VulRow>
  839. - <VulRow>
  840. <ReferURL>http://www.bulldogsupporters.com/store/../locations/detail.php?locationID=3</ReferURL>
  841. <Parameter>locationID=3</Parameter>
  842. <Type>Integer</Type>
  843. <KWordActionURL>Bulldog</KWordActionURL>
  844. <Vulnerability>URL SQL INJECTION</Vulnerability>
  845. </VulRow>
  846. - <VulRow>
  847. <ReferURL>http://www.bulldogsupporters.com/store/../locations/detail.php?locationID=99999999</ReferURL>
  848. <Parameter>locationID=99999999</Parameter>
  849. <Type>Integer</Type>
  850. <KWordActionURL>Bulldog</KWordActionURL>
  851. <Vulnerability>URL SQL INJECTION</Vulnerability>
  852. </VulRow>
  853. - <VulRow>
  854. <ReferURL>http://www.bulldogsupporters.com/links/../events/index.php?filter=99999999</ReferURL>
  855. <Parameter>filter=99999999</Parameter>
  856. <Type>Integer</Type>
  857. <KWordActionURL>Bulldog</KWordActionURL>
  858. <Vulnerability>URL SQL INJECTION</Vulnerability>
  859. </VulRow>
  860. - <VulRow>
  861. <ReferURL>http://www.bulldogsupporters.com/links/../locations/detail.php?locationID=3</ReferURL>
  862. <Parameter>locationID=3</Parameter>
  863. <Type>Integer</Type>
  864. <KWordActionURL>Bulldog</KWordActionURL>
  865. <Vulnerability>URL SQL INJECTION</Vulnerability>
  866. </VulRow>
  867. - <VulRow>
  868. <ReferURL>http://www.bulldogsupporters.com/links/../locations/detail.php?locationID=99999999</ReferURL>
  869. <Parameter>locationID=99999999</Parameter>
  870. <Type>Integer</Type>
  871. <KWordActionURL>Bulldog</KWordActionURL>
  872. <Vulnerability>URL SQL INJECTION</Vulnerability>
  873. </VulRow>
  874. - <VulRow>
  875. <ReferURL>http://www.bulldogsupporters.com/aodenver/../locations/detail.php?locationID=3</ReferURL>
  876. <Parameter>locationID=3</Parameter>
  877. <Type>Integer</Type>
  878. <KWordActionURL>Bulldog</KWordActionURL>
  879. <Vulnerability>URL SQL INJECTION</Vulnerability>
  880. </VulRow>
  881. - <VulRow>
  882. <ReferURL>http://www.bulldogsupporters.com/aodenver/../locations/detail.php?locationID=99999999</ReferURL>
  883. <Parameter>locationID=99999999</Parameter>
  884. <Type>Integer</Type>
  885. <KWordActionURL>Bulldog</KWordActionURL>
  886. <Vulnerability>URL SQL INJECTION</Vulnerability>
  887. </VulRow>
  888. - <VulRow>
  889. <ReferURL>http://www.bulldogsupporters.com/aodenver/../events/index.php?filter=99999999</ReferURL>
  890. <Parameter>filter=99999999</Parameter>
  891. <Type>Integer</Type>
  892. <KWordActionURL>Bulldog</KWordActionURL>
  893. <Vulnerability>URL SQL INJECTION</Vulnerability>
  894. </VulRow>
  895. - <VulRow>
  896. <ReferURL>http://www.bulldogsupporters.com/aodenver/../events/location.php?locationID=1</ReferURL>
  897. <Parameter>locationID=1</Parameter>
  898. <Type>Integer</Type>
  899. <KWordActionURL>Bulldog</KWordActionURL>
  900. <Vulnerability>URL SQL INJECTION</Vulnerability>
  901. </VulRow>
  902. - <VulRow>
  903. <ReferURL>http://www.bulldogsupporters.com/aodenver/../events/location.php?locationID=99999999</ReferURL>
  904. <Parameter>locationID=99999999</Parameter>
  905. <Type>Integer</Type>
  906. <KWordActionURL>Bulldog</KWordActionURL>
  907. <Vulnerability>URL SQL INJECTION</Vulnerability>
  908. </VulRow>
  909. - <VulRow>
  910. <ReferURL>http://www.bulldogsupporters.com/coloradoef/../events/index.php?filter=99999999</ReferURL>
  911. <Parameter>filter=99999999</Parameter>
  912. <Type>Integer</Type>
  913. <KWordActionURL>Bulldog</KWordActionURL>
  914. <Vulnerability>URL SQL INJECTION</Vulnerability>
  915. </VulRow>
  916. - <VulRow>
  917. <ReferURL>http://www.bulldogsupporters.com/coloradoef/../locations/detail.php?locationID=3</ReferURL>
  918. <Parameter>locationID=3</Parameter>
  919. <Type>Integer</Type>
  920. <KWordActionURL>Bulldog</KWordActionURL>
  921. <Vulnerability>URL SQL INJECTION</Vulnerability>
  922. </VulRow>
  923. - <VulRow>
  924. <ReferURL>http://www.bulldogsupporters.com/coloradoef/../locations/detail.php?locationID=99999999</ReferURL>
  925. <Parameter>locationID=99999999</Parameter>
  926. <Type>Integer</Type>
  927. <KWordActionURL>Bulldog</KWordActionURL>
  928. <Vulnerability>URL SQL INJECTION</Vulnerability>
  929. </VulRow>
  930. - <VulRow>
  931. <ReferURL>http://www.bulldogsupporters.com/coloradoef/../events/location.php?locationID=12</ReferURL>
  932. <Parameter>locationID=12</Parameter>
  933. <Type>Integer</Type>
  934. <KWordActionURL>Bulldog</KWordActionURL>
  935. <Vulnerability>URL SQL INJECTION</Vulnerability>
  936. </VulRow>
  937. - <VulRow>
  938. <ReferURL>http://www.bulldogsupporters.com/coloradoef/../events/location.php?locationID=99999999</ReferURL>
  939. <Parameter>locationID=99999999</Parameter>
  940. <Type>Integer</Type>
  941. <KWordActionURL>Bulldog</KWordActionURL>
  942. <Vulnerability>URL SQL INJECTION</Vulnerability>
  943. </VulRow>
  944. - <VulRow>
  945. <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../events/index.php?filter=99999999</ReferURL>
  946. <Parameter>filter=99999999</Parameter>
  947. <Type>Integer</Type>
  948. <KWordActionURL>Bulldog</KWordActionURL>
  949. <Vulnerability>URL SQL INJECTION</Vulnerability>
  950. </VulRow>
  951. - <VulRow>
  952. <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../locations/detail.php?locationID=3</ReferURL>
  953. <Parameter>locationID=3</Parameter>
  954. <Type>Integer</Type>
  955. <KWordActionURL>Bulldog</KWordActionURL>
  956. <Vulnerability>URL SQL INJECTION</Vulnerability>
  957. </VulRow>
  958. - <VulRow>
  959. <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../locations/detail.php?locationID=99999999</ReferURL>
  960. <Parameter>locationID=99999999</Parameter>
  961. <Type>Integer</Type>
  962. <KWordActionURL>Bulldog</KWordActionURL>
  963. <Vulnerability>URL SQL INJECTION</Vulnerability>
  964. </VulRow>
  965. - <VulRow>
  966. <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../events/location.php?locationID=12</ReferURL>
  967. <Parameter>locationID=12</Parameter>
  968. <Type>Integer</Type>
  969. <KWordActionURL>Bulldog</KWordActionURL>
  970. <Vulnerability>URL SQL INJECTION</Vulnerability>
  971. </VulRow>
  972. - <VulRow>
  973. <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../events/location.php?locationID=99999999</ReferURL>
  974. <Parameter>locationID=99999999</Parameter>
  975. <Type>Integer</Type>
  976. <KWordActionURL>Bulldog</KWordActionURL>
  977. <Vulnerability>URL SQL INJECTION</Vulnerability>
  978. </VulRow>
  979. - <VulRow>
  980. <ReferURL>http://www.bulldogsupporters.com/fcb5280/../events/index.php?filter=99999999</ReferURL>
  981. <Parameter>filter=99999999</Parameter>
  982. <Type>Integer</Type>
  983. <KWordActionURL>Bulldog</KWordActionURL>
  984. <Vulnerability>URL SQL INJECTION</Vulnerability>
  985. </VulRow>
  986. - <VulRow>
  987. <ReferURL>http://www.bulldogsupporters.com/fcb5280/../locations/detail.php?locationID=3</ReferURL>
  988. <Parameter>locationID=3</Parameter>
  989. <Type>Integer</Type>
  990. <KWordActionURL>Bulldog</KWordActionURL>
  991. <Vulnerability>URL SQL INJECTION</Vulnerability>
  992. </VulRow>
  993. - <VulRow>
  994. <ReferURL>http://www.bulldogsupporters.com/fcb5280/../locations/detail.php?locationID=99999999</ReferURL>
  995. <Parameter>locationID=99999999</Parameter>
  996. <Type>Integer</Type>
  997. <KWordActionURL>Bulldog</KWordActionURL>
  998. <Vulnerability>URL SQL INJECTION</Vulnerability>
  999. </VulRow>
  1000. - <VulRow>
  1001. <ReferURL>http://www.bulldogsupporters.com/fcb5280/../events/location.php?locationID=1</ReferURL>
  1002. <Parameter>locationID=1</Parameter>
  1003. <Type>Integer</Type>
  1004. <KWordActionURL>Bulldog</KWordActionURL>
  1005. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1006. </VulRow>
  1007. - <VulRow>
  1008. <ReferURL>http://www.bulldogsupporters.com/fcb5280/../events/location.php?locationID=99999999</ReferURL>
  1009. <Parameter>locationID=99999999</Parameter>
  1010. <Type>Integer</Type>
  1011. <KWordActionURL>Bulldog</KWordActionURL>
  1012. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1013. </VulRow>
  1014. - <VulRow>
  1015. <ReferURL>http://www.bulldogsupporters.com/fcbayern/../events/index.php?filter=99999999</ReferURL>
  1016. <Parameter>filter=99999999</Parameter>
  1017. <Type>Integer</Type>
  1018. <KWordActionURL>Bulldog</KWordActionURL>
  1019. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1020. </VulRow>
  1021. - <VulRow>
  1022. <ReferURL>http://www.bulldogsupporters.com/fcbayern/../locations/detail.php?locationID=3</ReferURL>
  1023. <Parameter>locationID=3</Parameter>
  1024. <Type>Integer</Type>
  1025. <KWordActionURL>Bulldog</KWordActionURL>
  1026. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1027. </VulRow>
  1028. - <VulRow>
  1029. <ReferURL>http://www.bulldogsupporters.com/fcbayern/../locations/detail.php?locationID=99999999</ReferURL>
  1030. <Parameter>locationID=99999999</Parameter>
  1031. <Type>Integer</Type>
  1032. <KWordActionURL>Bulldog</KWordActionURL>
  1033. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1034. </VulRow>
  1035. - <VulRow>
  1036. <ReferURL>http://www.bulldogsupporters.com/fcbayern/../events/location.php?locationID=12</ReferURL>
  1037. <Parameter>locationID=12</Parameter>
  1038. <Type>Integer</Type>
  1039. <KWordActionURL>Bulldog</KWordActionURL>
  1040. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1041. </VulRow>
  1042. - <VulRow>
  1043. <ReferURL>http://www.bulldogsupporters.com/fcbayern/../events/location.php?locationID=99999999</ReferURL>
  1044. <Parameter>locationID=99999999</Parameter>
  1045. <Type>Integer</Type>
  1046. <KWordActionURL>Bulldog</KWordActionURL>
  1047. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1048. </VulRow>
  1049. - <VulRow>
  1050. <ReferURL>http://www.bulldogsupporters.com/rmb/../events/index.php?filter=99999999</ReferURL>
  1051. <Parameter>filter=99999999</Parameter>
  1052. <Type>Integer</Type>
  1053. <KWordActionURL>Bulldog</KWordActionURL>
  1054. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1055. </VulRow>
  1056. - <VulRow>
  1057. <ReferURL>http://www.bulldogsupporters.com/rmb/../locations/detail.php?locationID=3</ReferURL>
  1058. <Parameter>locationID=3</Parameter>
  1059. <Type>Integer</Type>
  1060. <KWordActionURL>Bulldog</KWordActionURL>
  1061. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1062. </VulRow>
  1063. - <VulRow>
  1064. <ReferURL>http://www.bulldogsupporters.com/rmb/../locations/detail.php?locationID=99999999</ReferURL>
  1065. <Parameter>locationID=99999999</Parameter>
  1066. <Type>Integer</Type>
  1067. <KWordActionURL>Bulldog</KWordActionURL>
  1068. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1069. </VulRow>
  1070. - <VulRow>
  1071. <ReferURL>http://www.bulldogsupporters.com/rmb/../events/location.php?locationID=1</ReferURL>
  1072. <Parameter>locationID=1</Parameter>
  1073. <Type>Integer</Type>
  1074. <KWordActionURL>Bulldog</KWordActionURL>
  1075. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1076. </VulRow>
  1077. - <VulRow>
  1078. <ReferURL>http://www.bulldogsupporters.com/rmb/../events/location.php?locationID=99999999</ReferURL>
  1079. <Parameter>locationID=99999999</Parameter>
  1080. <Type>Integer</Type>
  1081. <KWordActionURL>Bulldog</KWordActionURL>
  1082. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1083. </VulRow>
  1084. - <VulRow>
  1085. <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../events/index.php?filter=99999999</ReferURL>
  1086. <Parameter>filter=99999999</Parameter>
  1087. <Type>Integer</Type>
  1088. <KWordActionURL>Bulldog</KWordActionURL>
  1089. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1090. </VulRow>
  1091. - <VulRow>
  1092. <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../locations/detail.php?locationID=3</ReferURL>
  1093. <Parameter>locationID=3</Parameter>
  1094. <Type>Integer</Type>
  1095. <KWordActionURL>Bulldog</KWordActionURL>
  1096. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1097. </VulRow>
  1098. - <VulRow>
  1099. <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../locations/detail.php?locationID=99999999</ReferURL>
  1100. <Parameter>locationID=99999999</Parameter>
  1101. <Type>Integer</Type>
  1102. <KWordActionURL>Bulldog</KWordActionURL>
  1103. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1104. </VulRow>
  1105. - <VulRow>
  1106. <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../events/location.php?locationID=12</ReferURL>
  1107. <Parameter>locationID=12</Parameter>
  1108. <Type>Integer</Type>
  1109. <KWordActionURL>Bulldog</KWordActionURL>
  1110. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1111. </VulRow>
  1112. - <VulRow>
  1113. <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../events/location.php?locationID=99999999</ReferURL>
  1114. <Parameter>locationID=99999999</Parameter>
  1115. <Type>Integer</Type>
  1116. <KWordActionURL>Bulldog</KWordActionURL>
  1117. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1118. </VulRow>
  1119. - <VulRow>
  1120. <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../locations/detail.php?locationID=3</ReferURL>
  1121. <Parameter>locationID=3</Parameter>
  1122. <Type>Integer</Type>
  1123. <KWordActionURL>Bulldog</KWordActionURL>
  1124. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1125. </VulRow>
  1126. - <VulRow>
  1127. <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../locations/detail.php?locationID=99999999</ReferURL>
  1128. <Parameter>locationID=99999999</Parameter>
  1129. <Type>Integer</Type>
  1130. <KWordActionURL>Bulldog</KWordActionURL>
  1131. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1132. </VulRow>
  1133. - <VulRow>
  1134. <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../events/index.php?filter=99999999</ReferURL>
  1135. <Parameter>filter=99999999</Parameter>
  1136. <Type>Integer</Type>
  1137. <KWordActionURL>Bulldog</KWordActionURL>
  1138. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1139. </VulRow>
  1140. - <VulRow>
  1141. <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../events/location.php?locationID=12</ReferURL>
  1142. <Parameter>locationID=12</Parameter>
  1143. <Type>Integer</Type>
  1144. <KWordActionURL>Bulldog</KWordActionURL>
  1145. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1146. </VulRow>
  1147. - <VulRow>
  1148. <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../events/location.php?locationID=99999999</ReferURL>
  1149. <Parameter>locationID=99999999</Parameter>
  1150. <Type>Integer</Type>
  1151. <KWordActionURL>Bulldog</KWordActionURL>
  1152. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1153. </VulRow>
  1154. - <VulRow>
  1155. <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../locations/detail.php?locationID=3</ReferURL>
  1156. <Parameter>locationID=3</Parameter>
  1157. <Type>Integer</Type>
  1158. <KWordActionURL>Bulldog</KWordActionURL>
  1159. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1160. </VulRow>
  1161. - <VulRow>
  1162. <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../locations/detail.php?locationID=99999999</ReferURL>
  1163. <Parameter>locationID=99999999</Parameter>
  1164. <Type>Integer</Type>
  1165. <KWordActionURL>Bulldog</KWordActionURL>
  1166. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1167. </VulRow>
  1168. - <VulRow>
  1169. <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../events/index.php?filter=99999999</ReferURL>
  1170. <Parameter>filter=99999999</Parameter>
  1171. <Type>Integer</Type>
  1172. <KWordActionURL>Bulldog</KWordActionURL>
  1173. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1174. </VulRow>
  1175. - <VulRow>
  1176. <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../events/location.php?locationID=12</ReferURL>
  1177. <Parameter>locationID=12</Parameter>
  1178. <Type>Integer</Type>
  1179. <KWordActionURL>Bulldog</KWordActionURL>
  1180. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1181. </VulRow>
  1182. - <VulRow>
  1183. <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../events/location.php?locationID=99999999</ReferURL>
  1184. <Parameter>locationID=99999999</Parameter>
  1185. <Type>Integer</Type>
  1186. <KWordActionURL>Bulldog</KWordActionURL>
  1187. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1188. </VulRow>
  1189. - <VulRow>
  1190. <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../locations/detail.php?locationID=3</ReferURL>
  1191. <Parameter>locationID=3</Parameter>
  1192. <Type>Integer</Type>
  1193. <KWordActionURL>Bulldog</KWordActionURL>
  1194. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1195. </VulRow>
  1196. - <VulRow>
  1197. <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../locations/detail.php?locationID=99999999</ReferURL>
  1198. <Parameter>locationID=99999999</Parameter>
  1199. <Type>Integer</Type>
  1200. <KWordActionURL>Bulldog</KWordActionURL>
  1201. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1202. </VulRow>
  1203. - <VulRow>
  1204. <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../events/index.php?filter=99999999</ReferURL>
  1205. <Parameter>filter=99999999</Parameter>
  1206. <Type>Integer</Type>
  1207. <KWordActionURL>Bulldog</KWordActionURL>
  1208. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1209. </VulRow>
  1210. - <VulRow>
  1211. <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../events/location.php?locationID=12</ReferURL>
  1212. <Parameter>locationID=12</Parameter>
  1213. <Type>Integer</Type>
  1214. <KWordActionURL>Bulldog</KWordActionURL>
  1215. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1216. </VulRow>
  1217. - <VulRow>
  1218. <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../events/location.php?locationID=99999999</ReferURL>
  1219. <Parameter>locationID=99999999</Parameter>
  1220. <Type>Integer</Type>
  1221. <KWordActionURL>Bulldog</KWordActionURL>
  1222. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1223. </VulRow>
  1224. - <VulRow>
  1225. <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../locations/detail.php?locationID=3</ReferURL>
  1226. <Parameter>locationID=3</Parameter>
  1227. <Type>Integer</Type>
  1228. <KWordActionURL>Bulldog</KWordActionURL>
  1229. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1230. </VulRow>
  1231. - <VulRow>
  1232. <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../locations/detail.php?locationID=99999999</ReferURL>
  1233. <Parameter>locationID=99999999</Parameter>
  1234. <Type>Integer</Type>
  1235. <KWordActionURL>Bulldog</KWordActionURL>
  1236. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1237. </VulRow>
  1238. - <VulRow>
  1239. <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../events/index.php?filter=99999999</ReferURL>
  1240. <Parameter>filter=99999999</Parameter>
  1241. <Type>Integer</Type>
  1242. <KWordActionURL>Bulldog</KWordActionURL>
  1243. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1244. </VulRow>
  1245. - <VulRow>
  1246. <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../events/location.php?locationID=12</ReferURL>
  1247. <Parameter>locationID=12</Parameter>
  1248. <Type>Integer</Type>
  1249. <KWordActionURL>Bulldog</KWordActionURL>
  1250. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1251. </VulRow>
  1252. - <VulRow>
  1253. <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../events/location.php?locationID=99999999</ReferURL>
  1254. <Parameter>locationID=99999999</Parameter>
  1255. <Type>Integer</Type>
  1256. <KWordActionURL>Bulldog</KWordActionURL>
  1257. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1258. </VulRow>
  1259. - <VulRow>
  1260. <ReferURL>http://www.bulldogsupporters.com/mmh/../events/index.php?filter=99999999</ReferURL>
  1261. <Parameter>filter=99999999</Parameter>
  1262. <Type>Integer</Type>
  1263. <KWordActionURL>Bulldog</KWordActionURL>
  1264. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1265. </VulRow>
  1266. - <VulRow>
  1267. <ReferURL>http://www.bulldogsupporters.com/mmh/../locations/detail.php?locationID=3</ReferURL>
  1268. <Parameter>locationID=3</Parameter>
  1269. <Type>Integer</Type>
  1270. <KWordActionURL>Bulldog</KWordActionURL>
  1271. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1272. </VulRow>
  1273. - <VulRow>
  1274. <ReferURL>http://www.bulldogsupporters.com/mmh/../locations/detail.php?locationID=99999999</ReferURL>
  1275. <Parameter>locationID=99999999</Parameter>
  1276. <Type>Integer</Type>
  1277. <KWordActionURL>Bulldog</KWordActionURL>
  1278. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1279. </VulRow>
  1280. - <VulRow>
  1281. <ReferURL>http://www.bulldogsupporters.com/mmh/../events/location.php?locationID=1</ReferURL>
  1282. <Parameter>locationID=1</Parameter>
  1283. <Type>Integer</Type>
  1284. <KWordActionURL>Bulldog</KWordActionURL>
  1285. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1286. </VulRow>
  1287. - <VulRow>
  1288. <ReferURL>http://www.bulldogsupporters.com/mmh/../events/location.php?locationID=99999999</ReferURL>
  1289. <Parameter>locationID=99999999</Parameter>
  1290. <Type>Integer</Type>
  1291. <KWordActionURL>Bulldog</KWordActionURL>
  1292. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1293. </VulRow>
  1294. - <VulRow>
  1295. <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../locations/detail.php?locationID=3</ReferURL>
  1296. <Parameter>locationID=3</Parameter>
  1297. <Type>Integer</Type>
  1298. <KWordActionURL>Bulldog</KWordActionURL>
  1299. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1300. </VulRow>
  1301. - <VulRow>
  1302. <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../locations/detail.php?locationID=99999999</ReferURL>
  1303. <Parameter>locationID=99999999</Parameter>
  1304. <Type>Integer</Type>
  1305. <KWordActionURL>Bulldog</KWordActionURL>
  1306. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1307. </VulRow>
  1308. - <VulRow>
  1309. <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../events/index.php?filter=99999999</ReferURL>
  1310. <Parameter>filter=99999999</Parameter>
  1311. <Type>Integer</Type>
  1312. <KWordActionURL>Bulldog</KWordActionURL>
  1313. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1314. </VulRow>
  1315. - <VulRow>
  1316. <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../events/location.php?locationID=1</ReferURL>
  1317. <Parameter>locationID=1</Parameter>
  1318. <Type>Integer</Type>
  1319. <KWordActionURL>Bulldog</KWordActionURL>
  1320. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1321. </VulRow>
  1322. - <VulRow>
  1323. <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../events/location.php?locationID=99999999</ReferURL>
  1324. <Parameter>locationID=99999999</Parameter>
  1325. <Type>Integer</Type>
  1326. <KWordActionURL>Bulldog</KWordActionURL>
  1327. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1328. </VulRow>
  1329. - <VulRow>
  1330. <ReferURL>http://www.bulldogsupporters.com/fldenver/../events/index.php?filter=99999999</ReferURL>
  1331. <Parameter>filter=99999999</Parameter>
  1332. <Type>Integer</Type>
  1333. <KWordActionURL>Bulldog</KWordActionURL>
  1334. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1335. </VulRow>
  1336. - <VulRow>
  1337. <ReferURL>http://www.bulldogsupporters.com/fldenver/../locations/detail.php?locationID=3</ReferURL>
  1338. <Parameter>locationID=3</Parameter>
  1339. <Type>Integer</Type>
  1340. <KWordActionURL>Bulldog</KWordActionURL>
  1341. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1342. </VulRow>
  1343. - <VulRow>
  1344. <ReferURL>http://www.bulldogsupporters.com/fldenver/../locations/detail.php?locationID=99999999</ReferURL>
  1345. <Parameter>locationID=99999999</Parameter>
  1346. <Type>Integer</Type>
  1347. <KWordActionURL>Bulldog</KWordActionURL>
  1348. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1349. </VulRow>
  1350. - <VulRow>
  1351. <ReferURL>http://www.bulldogsupporters.com/fldenver/../events/location.php?locationID=12</ReferURL>
  1352. <Parameter>locationID=12</Parameter>
  1353. <Type>Integer</Type>
  1354. <KWordActionURL>Bulldog</KWordActionURL>
  1355. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1356. </VulRow>
  1357. - <VulRow>
  1358. <ReferURL>http://www.bulldogsupporters.com/fldenver/../events/location.php?locationID=99999999</ReferURL>
  1359. <Parameter>locationID=99999999</Parameter>
  1360. <Type>Integer</Type>
  1361. <KWordActionURL>Bulldog</KWordActionURL>
  1362. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1363. </VulRow>
  1364. - <VulRow>
  1365. <ReferURL>http://www.panicd.com/store.php?t=NU&s=1</ReferURL>
  1366. <Parameter>fName=99999999</Parameter>
  1367. <Type>String</Type>
  1368. <KWordActionURL>http://www.panicd.com/wsms/wsms-ecomm-new-client-process.php^lName=WCRTESTINPUT000004&address1=WCRTESTINPUT000005&address2=WCRTESTINPUT000006&city=WCRTESTINPUT000007&zip=WCRTESTINPUT000008&phone=WCRTESTINPUT000009&hearabout=WCRTESTINPUT000010&dateAdded=&reseller=&ipAdd=&MM_insert=form1&state=AL&userName=WCRTESTINPUT000000&accountValid=N&nickName=WCRTESTINPUT000001&nnValid=N&pw=WCRTESTINPUT000002&fName=99999999</KWordActionURL>
  1369. <Vulnerability>XPath INJECTION</Vulnerability>
  1370. </VulRow>
  1371. - <VulRow>
  1372. <ReferURL>http://www.bulldogsupporters.com/events/trip.php?tripID=223</ReferURL>
  1373. <Parameter>tripID=223</Parameter>
  1374. <Type>Integer</Type>
  1375. <KWordActionURL>Bulldog</KWordActionURL>
  1376. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1377. </VulRow>
  1378. - <VulRow>
  1379. <ReferURL>http://www.bulldogsupporters.com/events/trip.php?tripID=99999999</ReferURL>
  1380. <Parameter>tripID=99999999</Parameter>
  1381. <Type>Integer</Type>
  1382. <KWordActionURL>Bulldog</KWordActionURL>
  1383. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1384. </VulRow>
  1385. - <VulRow>
  1386. <ReferURL>http://www.bulldogsupporters.com/members/../reservations/detail.php?reserveID=99999999</ReferURL>
  1387. <Parameter>reserveID=99999999</Parameter>
  1388. <Type>Integer</Type>
  1389. <KWordActionURL>Bulldog</KWordActionURL>
  1390. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1391. </VulRow>
  1392. - <VulRow>
  1393. <ReferURL>http://www.bigbandjazz.net/event.php?id=125</ReferURL>
  1394. <Parameter>id=125</Parameter>
  1395. <Type>Integer</Type>
  1396. <KWordActionURL>DATABASE</KWordActionURL>
  1397. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1398. </VulRow>
  1399. - <VulRow>
  1400. <ReferURL>http://www.bigbandjazz.net/event.php?id=99999999</ReferURL>
  1401. <Parameter>id=99999999</Parameter>
  1402. <Type>Integer</Type>
  1403. <KWordActionURL>DATABASE</KWordActionURL>
  1404. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1405. </VulRow>
  1406. - <VulRow>
  1407. <ReferURL>http://www.bigbandjazz.net/../artist.php?id=103</ReferURL>
  1408. <Parameter>id=103</Parameter>
  1409. <Type>Integer</Type>
  1410. <KWordActionURL>formerly</KWordActionURL>
  1411. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1412. </VulRow>
  1413. - <VulRow>
  1414. <ReferURL>http://www.bigbandjazz.net/../artist.php?id=99999999</ReferURL>
  1415. <Parameter>id=99999999</Parameter>
  1416. <Type>Integer</Type>
  1417. <KWordActionURL>Directed</KWordActionURL>
  1418. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1419. </VulRow>
  1420. - <VulRow>
  1421. <ReferURL>http://www.bigbandjazz.net/artist.php?id=161</ReferURL>
  1422. <Parameter>id=161</Parameter>
  1423. <Type>Integer</Type>
  1424. <KWordActionURL>Directed</KWordActionURL>
  1425. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1426. </VulRow>
  1427. - <VulRow>
  1428. <ReferURL>http://www.bigbandjazz.net/artist.php?id=99999999</ReferURL>
  1429. <Parameter>id=99999999</Parameter>
  1430. <Type>Integer</Type>
  1431. <KWordActionURL>Directed</KWordActionURL>
  1432. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1433. </VulRow>
  1434. - <VulRow>
  1435. <ReferURL>http://www.bigbandjazz.net/event.php?id=125^s=Search...&email=WCRTESTINPUT000000</ReferURL>
  1436. <Parameter>email=!S!WCRTESTINPUT000000!E!</Parameter>
  1437. <Type>String</Type>
  1438. <KWordActionURL>takes</KWordActionURL>
  1439. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1440. </VulRow>
  1441. - <VulRow>
  1442. <ReferURL>http://www.bigbandjazz.net/event.php?id=125^s=Search...&email=1</ReferURL>
  1443. <Parameter>email=1</Parameter>
  1444. <Type>Integer</Type>
  1445. <KWordActionURL>Remember</KWordActionURL>
  1446. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1447. </VulRow>
  1448. - <VulRow>
  1449. <ReferURL>http://www.bigbandjazz.net/event.php?id=125</ReferURL>
  1450. <Parameter>email=99999999</Parameter>
  1451. <Type>String</Type>
  1452. <KWordActionURL>http://www.bigbandjazz.net/event.php?id=125^s=Search...&email=99999999</KWordActionURL>
  1453. <Vulnerability>XPath INJECTION</Vulnerability>
  1454. </VulRow>
  1455. - <VulRow>
  1456. <ReferURL>http://www.bigbandjazz.net/event.php?id=125^email=WCRTESTINPUT000000&s=Search...</ReferURL>
  1457. <Parameter>s=Search...</Parameter>
  1458. <Type>String</Type>
  1459. <KWordActionURL>Morningside</KWordActionURL>
  1460. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1461. </VulRow>
  1462. - <VulRow>
  1463. <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091</ReferURL>
  1464. <Parameter>id=1091</Parameter>
  1465. <Type>Integer</Type>
  1466. <KWordActionURL>Morningside</KWordActionURL>
  1467. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1468. </VulRow>
  1469. - <VulRow>
  1470. <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=99999999</ReferURL>
  1471. <Parameter>id=99999999</Parameter>
  1472. <Type>Integer</Type>
  1473. <KWordActionURL>Sounds</KWordActionURL>
  1474. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1475. </VulRow>
  1476. - <VulRow>
  1477. <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091^s=Search...&email=WCRTESTINPUT000000</ReferURL>
  1478. <Parameter>email=!S!WCRTESTINPUT000000!E!</Parameter>
  1479. <Type>String</Type>
  1480. <KWordActionURL>Basie</KWordActionURL>
  1481. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1482. </VulRow>
  1483. - <VulRow>
  1484. <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091^s=Search...&email=1</ReferURL>
  1485. <Parameter>email=1</Parameter>
  1486. <Type>Integer</Type>
  1487. <KWordActionURL>Basie</KWordActionURL>
  1488. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1489. </VulRow>
  1490. - <VulRow>
  1491. <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091</ReferURL>
  1492. <Parameter>email=99999999</Parameter>
  1493. <Type>String</Type>
  1494. <KWordActionURL>http://www.bigbandjazz.net/cd-detail.php?id=1091^s=Search...&email=99999999</KWordActionURL>
  1495. <Vulnerability>XPath INJECTION</Vulnerability>
  1496. </VulRow>
  1497. - <VulRow>
  1498. <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091^email=WCRTESTINPUT000000&s=Search...</ReferURL>
  1499. <Parameter>s=Search...</Parameter>
  1500. <Type>String</Type>
  1501. <KWordActionURL>BIGBANDJAZZ</KWordActionURL>
  1502. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1503. </VulRow>
  1504. - <VulRow>
  1505. <ReferURL>http://www.bigbandjazz.net/news.php?id=120</ReferURL>
  1506. <Parameter>id=120</Parameter>
  1507. <Type>Integer</Type>
  1508. <KWordActionURL>Posted</KWordActionURL>
  1509. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1510. </VulRow>
  1511. - <VulRow>
  1512. <ReferURL>http://www.bigbandjazz.net/news.php?id=99999999</ReferURL>
  1513. <Parameter>id=99999999</Parameter>
  1514. <Type>Integer</Type>
  1515. <KWordActionURL>Posted</KWordActionURL>
  1516. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1517. </VulRow>
  1518. - <VulRow>
  1519. <ReferURL>http://www.bigkahunagolf.com/coursedetail.php?id=16</ReferURL>
  1520. <Parameter>id=16</Parameter>
  1521. <Type>Integer</Type>
  1522. <KWordActionURL>Nanea</KWordActionURL>
  1523. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1524. </VulRow>
  1525. - <VulRow>
  1526. <ReferURL>http://www.bigkahunagolf.com/coursedetail.php?id=99999999</ReferURL>
  1527. <Parameter>id=99999999</Parameter>
  1528. <Type>Integer</Type>
  1529. <KWordActionURL>Hamakua</KWordActionURL>
  1530. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1531. </VulRow>
  1532. - <VulRow>
  1533. <ReferURL>http://www.marussiamotors.ru/^url=/en/</ReferURL>
  1534. <Parameter>url=/en/</Parameter>
  1535. <Type>String</Type>
  1536. <KWordActionURL>MOTORS</KWordActionURL>
  1537. <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
  1538. </VulRow>
  1539. - <VulRow>
  1540. <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
  1541. <Parameter>fname</Parameter>
  1542. <Type>POST</Type>
  1543. <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000<>%3c%3e%253c%253e&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1544. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1545. </VulRow>
  1546. - <VulRow>
  1547. <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
  1548. <Parameter>lname</Parameter>
  1549. <Type>POST</Type>
  1550. <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001<>%3c%3e%253c%253e&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1551. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1552. </VulRow>
  1553. - <VulRow>
  1554. <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
  1555. <Parameter>mname</Parameter>
  1556. <Type>POST</Type>
  1557. <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002<>%3c%3e%253c%253e&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1558. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1559. </VulRow>
  1560. - <VulRow>
  1561. <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
  1562. <Parameter>phone</Parameter>
  1563. <Type>POST</Type>
  1564. <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003<>%3c%3e%253c%253e&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1565. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1566. </VulRow>
  1567. - <VulRow>
  1568. <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
  1569. <Parameter>mail</Parameter>
  1570. <Type>POST</Type>
  1571. <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004<>%3c%3e%253c%253e&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1572. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1573. </VulRow>
  1574. - <VulRow>
  1575. <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
  1576. <Parameter>about</Parameter>
  1577. <Type>POST</Type>
  1578. <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTINPUT000005<>%3c%3e%253c%253e</KWordActionURL>
  1579. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1580. </VulRow>
  1581. - <VulRow>
  1582. <ReferURL>http://www.marussiamotors.ru/en/company/career/^mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001</ReferURL>
  1583. <Parameter>lname=!S!WCRTESTINPUT000001!E!</Parameter>
  1584. <Type>String</Type>
  1585. <KWordActionURL>Circuit</KWordActionURL>
  1586. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1587. </VulRow>
  1588. - <VulRow>
  1589. <ReferURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</ReferURL>
  1590. <Parameter>about=!S!WCRTESTTEXTAREA000005!E!</Parameter>
  1591. <Type>String</Type>
  1592. <KWordActionURL>Looks</KWordActionURL>
  1593. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1594. </VulRow>
  1595. - <VulRow>
  1596. <ReferURL>http://www.marussiamotors.ru/en/company/career/^mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=1</ReferURL>
  1597. <Parameter>phone=1</Parameter>
  1598. <Type>Integer</Type>
  1599. <KWordActionURL>Circuit</KWordActionURL>
  1600. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1601. </VulRow>
  1602. - <VulRow>
  1603. <ReferURL>http://www.marussiamotors.ru/en/company/career/^mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=1</ReferURL>
  1604. <Parameter>lname=1</Parameter>
  1605. <Type>Integer</Type>
  1606. <KWordActionURL>becomes</KWordActionURL>
  1607. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1608. </VulRow>
  1609. - <VulRow>
  1610. <ReferURL>http://www.marussiamotors.ru/en/company/career/^about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004</ReferURL>
  1611. <Parameter>mail=!S!WCRTESTINPUT000004!E!</Parameter>
  1612. <Type>String</Type>
  1613. <KWordActionURL>Circuit</KWordActionURL>
  1614. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1615. </VulRow>
  1616. - <VulRow>
  1617. <ReferURL>http://www.marussiamotors.ru/en/company/career/^about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=1</ReferURL>
  1618. <Parameter>mail=1</Parameter>
  1619. <Type>String</Type>
  1620. <KWordActionURL>Looks</KWordActionURL>
  1621. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1622. </VulRow>
  1623. - <VulRow>
  1624. <ReferURL>http://www.marussiamotors.ru/en/company/career/^phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002</ReferURL>
  1625. <Parameter>mname=!S!WCRTESTINPUT000002!E!</Parameter>
  1626. <Type>String</Type>
  1627. <KWordActionURL>Looks</KWordActionURL>
  1628. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1629. </VulRow>
  1630. - <VulRow>
  1631. <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
  1632. <Parameter>fname</Parameter>
  1633. <Type>POST</Type>
  1634. <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000<>%3c%3e%253c%253e&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1635. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1636. </VulRow>
  1637. - <VulRow>
  1638. <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
  1639. <Parameter>lname</Parameter>
  1640. <Type>POST</Type>
  1641. <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001<>%3c%3e%253c%253e&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1642. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1643. </VulRow>
  1644. - <VulRow>
  1645. <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
  1646. <Parameter>mname</Parameter>
  1647. <Type>POST</Type>
  1648. <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002<>%3c%3e%253c%253e&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1649. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1650. </VulRow>
  1651. - <VulRow>
  1652. <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
  1653. <Parameter>phone</Parameter>
  1654. <Type>POST</Type>
  1655. <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003<>%3c%3e%253c%253e&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1656. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1657. </VulRow>
  1658. - <VulRow>
  1659. <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
  1660. <Parameter>mail</Parameter>
  1661. <Type>POST</Type>
  1662. <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004<>%3c%3e%253c%253e&about=WCRTESTTEXTAREA000005</KWordActionURL>
  1663. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1664. </VulRow>
  1665. - <VulRow>
  1666. <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
  1667. <Parameter>about</Parameter>
  1668. <Type>POST</Type>
  1669. <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTINPUT000005<>%3c%3e%253c%253e</KWordActionURL>
  1670. <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
  1671. </VulRow>
  1672. - <VulRow>
  1673. <ReferURL>http://www.marussiamotors.ru/company/career/^lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=1</ReferURL>
  1674. <Parameter>fname=1</Parameter>
  1675. <Type>Integer</Type>
  1676. <KWordActionURL>MARUSSIA</KWordActionURL>
  1677. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1678. </VulRow>
  1679. - <VulRow>
  1680. <ReferURL>http://www.marussiamotors.ru/company/career/^mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=1</ReferURL>
  1681. <Parameter>lname=1</Parameter>
  1682. <Type>Integer</Type>
  1683. <KWordActionURL>MARUSSIA</KWordActionURL>
  1684. <Vulnerability>POST SQL INJECTION</Vulnerability>
  1685. </VulRow>
  1686. - <VulRow>
  1687. <ReferURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=15&serial_type_4=46</ReferURL>
  1688. <Parameter>serial_type_4=46</Parameter>
  1689. <Type>Integer</Type>
  1690. <KWordActionURL>License</KWordActionURL>
  1691. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1692. </VulRow>
  1693. - <VulRow>
  1694. <ReferURL>http://www.rexpeed.net/2012/en/product_type_4.php?serial_type_2=3&serial_type_3=15</ReferURL>
  1695. <Parameter>serial_type_2</Parameter>
  1696. <Type>GET</Type>
  1697. <KWordActionURL>http://www.rexpeed.net/2012/en/product_type_4.php?serial_type_2=WCRTESTINPUT000000<>%3c%3e%253c%253e&serial_type_3=15</KWordActionURL>
  1698. <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
  1699. </VulRow>
  1700. - <VulRow>
  1701. <ReferURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=15&serial_type_4=99999999</ReferURL>
  1702. <Parameter>serial_type_4=99999999</Parameter>
  1703. <Type>Integer</Type>
  1704. <KWordActionURL>Diffuser</KWordActionURL>
  1705. <Vulnerability>URL SQL INJECTION</Vulnerability>
  1706. </VulRow>
  1707. - <VulRow>
  1708. <ReferURL>http://www.rexpeed.net/2012/en/product_type_4.php?serial_type_2=3&serial_type_3=15</ReferURL>
  1709. <Parameter>serial_type_3</Parameter>
  1710. <Type>GET</Type>
  1711. <KWordActionURL>http://www.rexpeed.net/2012/en/product_type_4.php?serial_type_2=3&serial_type_3=WCRTESTINPUT000001<>%3c%3e%253c%253e</KWordActionURL>
  1712. <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
  1713. </VulRow>
  1714. - <VulRow>
  1715. <ReferURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=15&serial_type_4=46</ReferURL>
  1716. <Parameter>serial_type_2</Parameter>
  1717. <Type>GET</Type>
  1718. <KWordActionURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=WCRTESTINPUT000000<>%3c%3e%253c%253e&serial_type_3=15&serial_type_4=46</KWordActionURL>
  1719. <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
  1720. </VulRow>
  1721. - <VulRow>
  1722. <ReferURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=15&serial_type_4=46</ReferURL>
  1723. <Parameter>serial_type_3</Parameter>
  1724. <Type>GET</Type>
  1725. <KWordActionURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=WCRTESTINPUT000001<>%3c%3e%253c%253e&serial_type_4=46</KWordActionURL>
  1726. <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
  1727. </VulRow>
  1728. </SiteVulList>
  1729. </ROOT>
  1730.  
  1731. ==============================
  1732. Dimension Blood Money/Swastika
  1733. ==============================
Advertisement
Add Comment
Please, Sign In to add comment