Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- SQLi Sites & Vulnerabilities "marussiamotors.ru"
- ------------------------------------------------
- <ROOT>
- - <SiteVulList>
- - <VulRow>
- <ReferURL>http://www.panicd.com/store.php?t=U&s=1</ReferURL>
- <Parameter>s=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Memberships</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/store.php?t=U&s=99999999</ReferURL>
- <Parameter>s=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Memberships</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/index.php</ReferURL>
- <Parameter>srch</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://www.panicd.com/main.php?srch=WCRTESTINPUT000000<>%3c%3e%253c%253e&Submit=Search&p=49</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/main.php?p=1</ReferURL>
- <Parameter>p=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Paranomal</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/main.php?p=99999999</ReferURL>
- <Parameter>p=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Paranomal</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/location.php?ln=1108</ReferURL>
- <Parameter>ln=1108</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Music</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/location.php?ln=99999999</ReferURL>
- <Parameter>ln=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Spanish</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/store.php?t=C&s=1&c=34</ReferURL>
- <Parameter>c=34</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Membership</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/store.php?t=C&s=1&c=99999999</ReferURL>
- <Parameter>c=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Dance</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/store.php?t=FP&store=99999999</ReferURL>
- <Parameter>store=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>shopping</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/wsms/wsms-ecomm-login-process.php^pw=WCRTESTINPUT000001&store=1&Submit2=Log In&email=1</ReferURL>
- <Parameter>email=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Returning</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/wsms/wsms-ecomm-login-process.php^pw=WCRTESTINPUT000001&store=1&Submit2=Log In&email=99999999</ReferURL>
- <Parameter>email=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>STARTED</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/store.php?t=U&s=</ReferURL>
- <Parameter>pw=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://www.panicd.com/wsms/wsms-ecomm-login-process.php^store=2&Submit2=Log In&email=WCRTESTINPUT000000&pw=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/wsms/wsms-ecomm-login-process.php^Submit2=Log In&email=WCRTESTINPUT000000&pw=WCRTESTINPUT000001&store=2</ReferURL>
- <Parameter>store=2</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Shirts</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/articles/^feed=rss2</ReferURL>
- <Parameter>feed=rss2</Parameter>
- <Type>String</Type>
- <KWordActionURL>PANICd</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/articles/wp-login.php?action=99999999</ReferURL>
- <Parameter>action=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>PANICd</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/articles/wp-trackback.php?p=73</ReferURL>
- <Parameter>p=73</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Member</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/articles/?m=201205</ReferURL>
- <Parameter>m=201205</Parameter>
- <Type>String</Type>
- <KWordActionURL>laquo</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/articles/^author=1</ReferURL>
- <Parameter>author=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>PANICd</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/detail.php?eventID=109</ReferURL>
- <Parameter>eventID=109</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/detail.php?eventID=99999999</ReferURL>
- <Parameter>eventID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/location.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/blogs/article.php?blogID=152</ReferURL>
- <Parameter>blogID=152</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/blogs/article.php?blogID=99999999</ReferURL>
- <Parameter>blogID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/locations/detail.php?locationID=1</ReferURL>
- <Parameter>locationID=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/article.php?newsID=44</ReferURL>
- <Parameter>newsID=44</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/article.php?newsID=99999999</ReferURL>
- <Parameter>newsID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/index.php?order=99999999</ReferURL>
- <Parameter>order=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/about/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/about/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/about/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/index.php?order=99999999</ReferURL>
- <Parameter>order=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/blogs/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/blogs/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/blogs/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/blogs/index.php?order=99999999</ReferURL>
- <Parameter>order=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/members/detail.php^appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0&mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=1</ReferURL>
- <Parameter>appCity=1</Parameter>
- <Type>String</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/../members/signup.php</ReferURL>
- <Parameter>appLastName</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000004<>%3c%3e%253c%253e&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/../members/signup.php</ReferURL>
- <Parameter>appCity</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000006<>%3c%3e%253c%253e&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/../members/signup.php</ReferURL>
- <Parameter>appState</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=WCRTESTINPUT000029<>%3c%3e%253c%253e&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/blogs/../members/signup.php</ReferURL>
- <Parameter>appMobilePhone</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000009<>%3c%3e%253c%253e&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/blogs/../members/signup.php</ReferURL>
- <Parameter>appFavNation</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000014<>%3c%3e%253c%253e&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/../members/signup.php</ReferURL>
- <Parameter>appFirstName</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000003<>%3c%3e%253c%253e&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/../members/signup.php</ReferURL>
- <Parameter>appHomePhone</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000010<>%3c%3e%253c%253e&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/news/../members/signup.php</ReferURL>
- <Parameter>appFavClub</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000013<>%3c%3e%253c%253e&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/about/../members/signup.php</ReferURL>
- <Parameter>appZip</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000007<>%3c%3e%253c%253e&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000011&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/about/../members/signup.php</ReferURL>
- <Parameter>appNotes</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.bulldogsupporters.com/members/detail.php^mode=submit&appDate=2012-06-05&appLevel=U&appFirstName=WCRTESTINPUT000000&appLastName=WCRTESTINPUT000001&appAddress=WCRTESTINPUT000002&appCity=WCRTESTINPUT000003&appZip=WCRTESTINPUT000004&appEmail=WCRTESTINPUT000005&appMobilePhone=WCRTESTINPUT000006&appHomePhone=WCRTESTINPUT000007&appRapidsAccount=WCRTESTINPUT000008&appDetailsToRapids=0&appFavClub=WCRTESTINPUT000009&appFavNation=WCRTESTINPUT000010&appTailgates=0&appChants=0&appFlags=0&appSponsorship=0&appTrips=0&appBSGFC=0&appWebsite=0&appCharity=0&appNotes=WCRTESTINPUT000023<>%3c%3e%253c%253e&appPassword=WCRTESTINPUT000012&appPassword2=WCRTESTINPUT000013&appGroup=BSG&submit=Submit&googleSearchText=WCRTESTINPUT000014&appState=OT&appRapidsSTHolder=TER&appRapidsSTSince=0&appRapidsSTCurrent=0</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/locations/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/locations/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/locations/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bsgfc/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bsgfc/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bsgfc/index.php?order=date&filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bsgfc/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bsgfc/index.php?filter=game&order=99999999</ReferURL>
- <Parameter>order=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bsgfc/../events/detail.php?eventID=159</ReferURL>
- <Parameter>eventID=159</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bsgfc/../events/detail.php?eventID=99999999</ReferURL>
- <Parameter>eventID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/join/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/join/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/join/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/contact/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/contact/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/contact/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/groups/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/groups/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/groups/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/media/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/media/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/media/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/media/gallery.php?galleryID=7</ReferURL>
- <Parameter>galleryID=7</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/media/gallery.php?galleryID=99999999</ReferURL>
- <Parameter>galleryID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/season_tickets/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/season_tickets/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/season_tickets/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tickets/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tickets/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tickets/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/buses/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/buses/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/buses/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tailgates/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tailgates/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tailgates/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/chants/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/chants/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/chants/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/chants/index.php?order=99999999</ReferURL>
- <Parameter>order=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/chants/detail.php?chantID=301</ReferURL>
- <Parameter>chantID=301</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/chants/detail.php?chantID=99999999</ReferURL>
- <Parameter>chantID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/visiting_supporters/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/visiting_supporters/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/visiting_supporters/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tour2012/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tour2012/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tour2012/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tour2012/../events/detail.php?eventID=223</ReferURL>
- <Parameter>eventID=223</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/tour2012/../events/detail.php?eventID=99999999</ReferURL>
- <Parameter>eventID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/southwest/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/southwest/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/southwest/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/reservations/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/reservations/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/reservations/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/dss/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/dss/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/dss/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/members/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/members/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/members/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/store/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/store/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/store/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/links/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/links/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/links/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/aodenver/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/aodenver/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/aodenver/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/aodenver/../events/location.php?locationID=1</ReferURL>
- <Parameter>locationID=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/aodenver/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/coloradoef/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/coloradoef/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/coloradoef/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/coloradoef/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/coloradoef/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_gunners/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcb5280/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcb5280/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcb5280/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcb5280/../events/location.php?locationID=1</ReferURL>
- <Parameter>locationID=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcb5280/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcbayern/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcbayern/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcbayern/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcbayern/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fcbayern/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/rmb/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/rmb/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/rmb/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/rmb/../events/location.php?locationID=1</ReferURL>
- <Parameter>locationID=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/rmb/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_palace/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/ffcdenver/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_reds/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/bwcolorado/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_red_devils/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/mmh/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/mmh/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/mmh/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/mmh/../events/location.php?locationID=1</ReferURL>
- <Parameter>locationID=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/mmh/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../events/location.php?locationID=1</ReferURL>
- <Parameter>locationID=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/colorado_spurs/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fldenver/../events/index.php?filter=99999999</ReferURL>
- <Parameter>filter=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fldenver/../locations/detail.php?locationID=3</ReferURL>
- <Parameter>locationID=3</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fldenver/../locations/detail.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fldenver/../events/location.php?locationID=12</ReferURL>
- <Parameter>locationID=12</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/fldenver/../events/location.php?locationID=99999999</ReferURL>
- <Parameter>locationID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.panicd.com/store.php?t=NU&s=1</ReferURL>
- <Parameter>fName=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://www.panicd.com/wsms/wsms-ecomm-new-client-process.php^lName=WCRTESTINPUT000004&address1=WCRTESTINPUT000005&address2=WCRTESTINPUT000006&city=WCRTESTINPUT000007&zip=WCRTESTINPUT000008&phone=WCRTESTINPUT000009&hearabout=WCRTESTINPUT000010&dateAdded=&reseller=&ipAdd=&MM_insert=form1&state=AL&userName=WCRTESTINPUT000000&accountValid=N&nickName=WCRTESTINPUT000001&nnValid=N&pw=WCRTESTINPUT000002&fName=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/trip.php?tripID=223</ReferURL>
- <Parameter>tripID=223</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/events/trip.php?tripID=99999999</ReferURL>
- <Parameter>tripID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bulldogsupporters.com/members/../reservations/detail.php?reserveID=99999999</ReferURL>
- <Parameter>reserveID=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Bulldog</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/event.php?id=125</ReferURL>
- <Parameter>id=125</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>DATABASE</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/event.php?id=99999999</ReferURL>
- <Parameter>id=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>DATABASE</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/../artist.php?id=103</ReferURL>
- <Parameter>id=103</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>formerly</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/../artist.php?id=99999999</ReferURL>
- <Parameter>id=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Directed</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/artist.php?id=161</ReferURL>
- <Parameter>id=161</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Directed</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/artist.php?id=99999999</ReferURL>
- <Parameter>id=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Directed</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/event.php?id=125^s=Search...&email=WCRTESTINPUT000000</ReferURL>
- <Parameter>email=!S!WCRTESTINPUT000000!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>takes</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/event.php?id=125^s=Search...&email=1</ReferURL>
- <Parameter>email=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Remember</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/event.php?id=125</ReferURL>
- <Parameter>email=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://www.bigbandjazz.net/event.php?id=125^s=Search...&email=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/event.php?id=125^email=WCRTESTINPUT000000&s=Search...</ReferURL>
- <Parameter>s=Search...</Parameter>
- <Type>String</Type>
- <KWordActionURL>Morningside</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091</ReferURL>
- <Parameter>id=1091</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Morningside</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=99999999</ReferURL>
- <Parameter>id=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Sounds</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091^s=Search...&email=WCRTESTINPUT000000</ReferURL>
- <Parameter>email=!S!WCRTESTINPUT000000!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>Basie</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091^s=Search...&email=1</ReferURL>
- <Parameter>email=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Basie</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091</ReferURL>
- <Parameter>email=99999999</Parameter>
- <Type>String</Type>
- <KWordActionURL>http://www.bigbandjazz.net/cd-detail.php?id=1091^s=Search...&email=99999999</KWordActionURL>
- <Vulnerability>XPath INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/cd-detail.php?id=1091^email=WCRTESTINPUT000000&s=Search...</ReferURL>
- <Parameter>s=Search...</Parameter>
- <Type>String</Type>
- <KWordActionURL>BIGBANDJAZZ</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/news.php?id=120</ReferURL>
- <Parameter>id=120</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Posted</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigbandjazz.net/news.php?id=99999999</ReferURL>
- <Parameter>id=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Posted</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigkahunagolf.com/coursedetail.php?id=16</ReferURL>
- <Parameter>id=16</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Nanea</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.bigkahunagolf.com/coursedetail.php?id=99999999</ReferURL>
- <Parameter>id=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Hamakua</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/^url=/en/</ReferURL>
- <Parameter>url=/en/</Parameter>
- <Type>String</Type>
- <KWordActionURL>MOTORS</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
- <Parameter>fname</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000<>%3c%3e%253c%253e&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
- <Parameter>lname</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001<>%3c%3e%253c%253e&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
- <Parameter>mname</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002<>%3c%3e%253c%253e&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
- <Parameter>phone</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003<>%3c%3e%253c%253e&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
- <Parameter>mail</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004<>%3c%3e%253c%253e&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/?url=/en/company/career/</ReferURL>
- <Parameter>about</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTINPUT000005<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/company/career/^mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001</ReferURL>
- <Parameter>lname=!S!WCRTESTINPUT000001!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>Circuit</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</ReferURL>
- <Parameter>about=!S!WCRTESTTEXTAREA000005!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>Looks</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/company/career/^mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=1</ReferURL>
- <Parameter>phone=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Circuit</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/company/career/^mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=1</ReferURL>
- <Parameter>lname=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>becomes</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/company/career/^about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004</ReferURL>
- <Parameter>mail=!S!WCRTESTINPUT000004!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>Circuit</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/company/career/^about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=1</ReferURL>
- <Parameter>mail=1</Parameter>
- <Type>String</Type>
- <KWordActionURL>Looks</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/company/career/^phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002</ReferURL>
- <Parameter>mname=!S!WCRTESTINPUT000002!E!</Parameter>
- <Type>String</Type>
- <KWordActionURL>Looks</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
- <Parameter>fname</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000<>%3c%3e%253c%253e&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
- <Parameter>lname</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001<>%3c%3e%253c%253e&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
- <Parameter>mname</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002<>%3c%3e%253c%253e&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
- <Parameter>phone</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003<>%3c%3e%253c%253e&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
- <Parameter>mail</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004<>%3c%3e%253c%253e&about=WCRTESTTEXTAREA000005</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/en/?url=/company/career/</ReferURL>
- <Parameter>about</Parameter>
- <Type>POST</Type>
- <KWordActionURL>http://www.marussiamotors.ru/en/company/career/^fname=WCRTESTINPUT000000&lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTINPUT000005<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(Form)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/company/career/^lname=WCRTESTINPUT000001&mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=1</ReferURL>
- <Parameter>fname=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>MARUSSIA</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.marussiamotors.ru/company/career/^mname=WCRTESTINPUT000002&phone=WCRTESTINPUT000003&mail=WCRTESTINPUT000004&about=WCRTESTTEXTAREA000005&fname=WCRTESTINPUT000000&lname=1</ReferURL>
- <Parameter>lname=1</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>MARUSSIA</KWordActionURL>
- <Vulnerability>POST SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=15&serial_type_4=46</ReferURL>
- <Parameter>serial_type_4=46</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>License</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.rexpeed.net/2012/en/product_type_4.php?serial_type_2=3&serial_type_3=15</ReferURL>
- <Parameter>serial_type_2</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://www.rexpeed.net/2012/en/product_type_4.php?serial_type_2=WCRTESTINPUT000000<>%3c%3e%253c%253e&serial_type_3=15</KWordActionURL>
- <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=15&serial_type_4=99999999</ReferURL>
- <Parameter>serial_type_4=99999999</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>Diffuser</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.rexpeed.net/2012/en/product_type_4.php?serial_type_2=3&serial_type_3=15</ReferURL>
- <Parameter>serial_type_3</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://www.rexpeed.net/2012/en/product_type_4.php?serial_type_2=3&serial_type_3=WCRTESTINPUT000001<>%3c%3e%253c%253e</KWordActionURL>
- <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=15&serial_type_4=46</ReferURL>
- <Parameter>serial_type_2</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=WCRTESTINPUT000000<>%3c%3e%253c%253e&serial_type_3=15&serial_type_4=46</KWordActionURL>
- <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
- </VulRow>
- - <VulRow>
- <ReferURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=15&serial_type_4=46</ReferURL>
- <Parameter>serial_type_3</Parameter>
- <Type>GET</Type>
- <KWordActionURL>http://www.rexpeed.net/2012/en/product.php?serial_type_2=3&serial_type_3=WCRTESTINPUT000001<>%3c%3e%253c%253e&serial_type_4=46</KWordActionURL>
- <Vulnerability>Cross Site Scripting(URL)</Vulnerability>
- </VulRow>
- </SiteVulList>
- </ROOT>
- ==============================
- Dimension Blood Money/Swastika
- ==============================
Advertisement
Add Comment
Please, Sign In to add comment