[Mon Aug 29 14:29:54.593624 2016] [ssl:warn] [pid 23482] AH01909: 127.0.0.1:443:0 server certificate does NOT include an ID which matches the server name [Mon Aug 29 14:29:54.604444 2016] [ssl:warn] [pid 23483] AH01873: Init: Session Cache is not configured [hint: SSLSessionCache] [Mon Aug 29 14:29:54.604668 2016] [ssl:warn] [pid 23483] AH01909: 127.0.0.1:443:0 server certificate does NOT include an ID which matches the server name [Mon Aug 29 14:29:54.658879 2016] [mpm_prefork:notice] [pid 23483] AH00163: Apache/2.4.10 (Debian) OpenSSL/1.0.2d PHP/5.6.20-0+deb8u1 configured -- resuming normal operations [Mon Aug 29 14:29:54.658897 2016] [core:notice] [pid 23483] AH00094: Command line: '/usr/sbin/apache2 -f /home/clopez/webkit/webkit/layout-test-results/httpd.conf -C DocumentRoot "/home/clopez/webkit/webkit/LayoutTests/http/tests" -c TypesConfig "/home/clopez/webkit/webkit/LayoutTests/http/conf/mime.types" -c PHPINIDir "/home/clopez/webkit/webkit/LayoutTests/http/conf" -c CustomLog "/home/clopez/webkit/webkit/layout-test-results/access_log.txt" common -c ErrorLog "/home/clopez/webkit/webkit/layout-test-results/error_log.txt" -c PidFile /tmp/WebKit/httpd.pid -c Alias /js-test-resources "/home/clopez/webkit/webkit/LayoutTests/resources" -c Alias /media-resources "/home/clopez/webkit/webkit/LayoutTests/media" -c Alias /resources/testharness.css "/home/clopez/webkit/webkit/LayoutTests/resources/testharness.css" -c Alias /resources/testharness.js "/home/clopez/webkit/webkit/LayoutTests/resources/testharness.js" -c Alias /resources/testharnessreport.js "/home/clopez/webkit/webkit/LayoutTests/resources/testharnessreport.js" -C User "clopez" -C Listen 127.0.0.1:8000 -C Listen [::1]:8000 -C Listen 127.0.0.1:8080 -C Listen [::1]:8080 -C Listen 127.0.0.1:8443 -C Listen [::1]:8443 -c SSLCertificateFile /home/clopez/webkit/webkit/LayoutTests/http/conf/webkit-httpd.pem' [Mon Aug 29 14:36:15.953631 2016] [:error] [pid 29152] [client 127.0.0.1:35952] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/css/resources/delayedCircle.php' not found or unable to stat, referer: http://127.0.0.1:8000/css/object-fit-delayed-img-svg.html [Mon Aug 29 14:36:16.256787 2016] [:error] [pid 29329] [client 127.0.0.1:35986] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/download-json-with-delay.php' not found or unable to stat, referer: http://127.0.0.1:8000/fetch/clone-response-body.html [Mon Aug 29 14:36:39.291292 2016] [negotiation:error] [pid 29126] [client 127.0.0.1:36660] AH00687: Negotiation: discovered file(s) matching request: /home/clopez/webkit/webkit/LayoutTests/http/tests/misc/resources/acid3/support-a.png (None could be negotiated)., referer: http://127.0.0.1:8000/misc/acid3.html [Mon Aug 29 14:36:48.198207 2016] [:error] [pid 29122] [client 127.0.0.1:36718] PHP Warning: unlink(/tmp/-navigation-image-load-in-pagehide-handler.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/image-load-in-pagehide-handler.html [Mon Aug 29 14:36:48.591975 2016] [:error] [pid 29566] [client 127.0.0.1:36712] PHP Warning: unlink(/tmp/-navigation-image-load-in-unload-handler.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/image-load-in-unload-handler.html [Mon Aug 29 14:36:49.158390 2016] [:error] [pid 29465] [client 127.0.0.1:36582] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-cookie.html [Mon Aug 29 14:36:53.021752 2016] [cgi:error] [pid 30845] [client 127.0.0.1:36742] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/plugins/post-url-file.html [Mon Aug 29 14:36:53.021830 2016] [cgi:error] [pid 30845] [client 127.0.0.1:36742] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/plugins/post-url-file.html [Mon Aug 29 14:36:56.486132 2016] [:error] [pid 29124] [client 127.0.0.1:60632] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-cross-origin-from-https.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: https://127.0.0.1:8443/navigation/ping-attribute/anchor-cross-origin-from-https.html [Mon Aug 29 14:37:03.772891 2016] [:error] [pid 29156] [client 127.0.0.1:36924] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-cross-origin.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-cross-origin.html [Mon Aug 29 14:37:11.364080 2016] [:error] [pid 29124] [client 127.0.0.1:36962] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-same-origin.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-same-origin.html [Mon Aug 29 14:37:16.271162 2016] [:error] [pid 29108] [client 127.0.0.1:37004] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/slow-loading-script.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/slow-loading-page-with-slow-script.php [Mon Aug 29 14:37:18.715552 2016] [:error] [pid 29564] [client 127.0.0.1:37032] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-cookie.html [Mon Aug 29 14:37:19.756064 2016] [:error] [pid 29122] [client 127.0.0.1:37018] PHP Warning: filesize(): stat failed for ../../../resources/square.png in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 3, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 14:37:19.756099 2016] [:error] [pid 29122] [client 127.0.0.1:37018] PHP Warning: fopen(../../../resources/square.png): failed to open stream: No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 4, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 14:37:19.756107 2016] [:error] [pid 29122] [client 127.0.0.1:37018] PHP Warning: fread() expects parameter 1 to be resource, boolean given in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 5, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 14:37:19.756111 2016] [:error] [pid 29122] [client 127.0.0.1:37018] PHP Warning: fclose() expects parameter 1 to be resource, boolean given in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 6, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 14:37:19.756116 2016] [:error] [pid 29122] [client 127.0.0.1:37018] PHP Warning: Cannot modify header information - headers already sent by (output started at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php:3) in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 8, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 14:37:19.756125 2016] [:error] [pid 29122] [client 127.0.0.1:37018] PHP Warning: Cannot modify header information - headers already sent by (output started at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php:3) in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 9, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 14:37:19.756130 2016] [:error] [pid 29122] [client 127.0.0.1:37018] PHP Warning: Cannot modify header information - headers already sent by (output started at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php:3) in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 10, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 14:37:24.434635 2016] [cgi:error] [pid 29565] [client 127.0.0.1:37014] script not found or unable to stat: /home/clopez/webkit/webkit/LayoutTests/http/tests/plugins/resources/mock-plugin-with-csp.pl, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/plugin-in-iframe-with-csp.html [Mon Aug 29 14:37:25.068932 2016] [cgi:error] [pid 32208] [client 127.0.0.1:37120] AH01215: Use of uninitialized value $ENV{"HTTP_UPGRADE_INSECURE_REQUESTS"} in concatenation (.) or string at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/echo-https-header.pl line 8., referer: http://127.0.0.1:8000/security/contentSecurityPolicy/upgrade-insecure-requests/https-header-subresource.html [Mon Aug 29 14:37:25.953611 2016] [cgi:error] [pid 29124] [client 127.0.0.1:35016] AH01215: Use of uninitialized value $ENV{"HTTP_SET_COOKIE"} in concatenation (.) or string at /home/clopez/webkit/webkit/LayoutTests/http/tests/cookies/resources/setCookies.cgi line 11., referer: http://127.0.0.1:8000/security/contentSecurityPolicy/report-cross-origin-no-cookies.php [Mon Aug 29 14:37:26.113899 2016] [:error] [pid 1013] [client 127.0.0.1:60942] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: https://127.0.0.1:8443/navigation/ping-attribute/area-cross-origin-from-https.html [Mon Aug 29 14:37:33.562794 2016] [:error] [pid 32670] [client 127.0.0.1:37282] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-cross-origin.html [Mon Aug 29 14:37:36.003587 2016] [cgi:error] [pid 32221] [client 127.0.0.1:37330] AH01215: Use of uninitialized value $ENV{"HTTP_ORIGIN"} in concatenation (.) or string at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/originHeader/resources/print-origin.cgi line 8., referer: http://127.0.0.1:8000/security/originHeader/origin-header-for-get.html [Mon Aug 29 14:37:36.863781 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/base-href-control-char.html [Mon Aug 29 14:37:37.050512 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/base-href-null-char.html [Mon Aug 29 14:37:37.284771 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/base-href-scheme-relative.html [Mon Aug 29 14:37:37.374032 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/base-href.html [Mon Aug 29 14:37:37.475004 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/block-does-not-leak-location.html [Mon Aug 29 14:37:37.580490 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/block-does-not-leak-referrer.html [Mon Aug 29 14:37:37.669884 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/block-does-not-leak-that-page-was-blocked-using-empty-data-url.html [Mon Aug 29 14:37:37.818764 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/cookie-injection.html [Mon Aug 29 14:37:38.617919 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-code-attribute-2.html [Mon Aug 29 14:37:38.702258 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-code-attribute.html [Mon Aug 29 14:37:38.784587 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-control-char.html [Mon Aug 29 14:37:38.853502 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-in-path-unterminated.html [Mon Aug 29 14:37:38.853564 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-in-path-unterminated.html [Mon Aug 29 14:37:38.942156 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-javascript-url.html [Mon Aug 29 14:37:39.056880 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-null-char.html [Mon Aug 29 14:37:39.159281 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag.html [Mon Aug 29 14:37:39.267260 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/faux-script1.html [Mon Aug 29 14:37:39.354983 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/faux-script2.html [Mon Aug 29 14:37:39.432637 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/faux-script3.html [Mon Aug 29 14:37:39.524996 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/form-action.html [Mon Aug 29 14:37:39.666486 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/formaction-on-button.html [Mon Aug 29 14:37:39.777007 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/formaction-on-input.html [Mon Aug 29 14:37:39.876177 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/frameset-injection.html [Mon Aug 29 14:37:39.970409 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-base-href.html [Mon Aug 29 14:37:40.082092 2016] [cgi:error] [pid 32222] [client 127.0.0.1:37342] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 14:37:40.206918 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-iframe-javascript-url.html [Mon Aug 29 14:37:40.314098 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-iframe-no-inherit.php [Mon Aug 29 14:37:40.405985 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-javascript-link.html [Mon Aug 29 14:37:40.505319 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-link-onclick.html [Mon Aug 29 14:37:40.605624 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-object-tag.html [Mon Aug 29 14:37:40.700118 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 14:37:40.787295 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-script-tag-cross-domain.html [Mon Aug 29 14:37:40.872164 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-script-tag-with-source.html [Mon Aug 29 14:37:40.971875 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-script-tag.html [Mon Aug 29 14:37:40.979853 2016] [:error] [pid 32371] [client 127.0.0.1:37378] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-same-origin.html [Mon Aug 29 14:37:41.058744 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 14:37:41.135589 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-injection-allowed-2.html [Mon Aug 29 14:37:41.228005 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-injection-allowed-3.html [Mon Aug 29 14:37:41.318656 2016] [cgi:error] [pid 1578] [client 127.0.0.1:37340] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-injection-allowed.html [Mon Aug 29 14:37:41.403597 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-injection.html [Mon Aug 29 14:37:41.504050 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-more-encoding.html [Mon Aug 29 14:37:41.600744 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-twice-url-encode2.html [Mon Aug 29 14:37:41.707297 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-twice-url-encode3.html [Mon Aug 29 14:37:41.826140 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-twice-url-encode.html [Mon Aug 29 14:37:41.939550 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-url-encoded.html [Mon Aug 29 14:37:42.034910 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url.html [Mon Aug 29 14:37:42.117682 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-onload-GBK-char.html [Mon Aug 29 14:37:42.117764 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-onload-GBK-char.html [Mon Aug 29 14:37:42.218748 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-onload-in-svg-tag.html [Mon Aug 29 14:37:42.424976 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-srcdoc.html [Mon Aug 29 14:37:42.519277 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-GBK-char.html [Mon Aug 29 14:37:42.519352 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-GBK-char.html [Mon Aug 29 14:37:42.630576 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-accented-char.html [Mon Aug 29 14:37:42.721486 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding.html [Mon Aug 29 14:37:42.821155 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-non-ASCII-char2.html [Mon Aug 29 14:37:42.900969 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding.html [Mon Aug 29 14:37:42.997009 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-non-ASCII-char.html [Mon Aug 29 14:37:43.089434 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-tricky.html [Mon Aug 29 14:37:43.201529 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-tag-with-comma.html [Mon Aug 29 14:37:43.201579 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-tag-with-comma.html [Mon Aug 29 14:37:43.201663 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-tag-with-comma.html [Mon Aug 29 14:37:43.296363 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/inline-event-HTML-entities.html [Mon Aug 29 14:37:43.382430 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-HTML-entities-control-char.html [Mon Aug 29 14:37:43.449888 2016] [:error] [pid 29124] [client 127.0.0.1:37254] PHP Warning: Cannot modify header information - headers already sent by (output started at /home/clopez/webkit/webkit/LayoutTests/http/tests/w3c/webperf/resources/blank_page_green_with_allow_timing.php:6) in /home/clopez/webkit/webkit/LayoutTests/http/tests/w3c/webperf/resources/blank_page_green_with_allow_timing.php on line 8, referer: http://127.0.0.1:8000/w3c/webperf/submission/Intel/resource-timing/test_resource_timing_timing_allow_cross_origin_resource_request.html [Mon Aug 29 14:37:43.470746 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-HTML-entities-named.html [Mon Aug 29 14:37:43.557659 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-HTML-entities-null-char.html [Mon Aug 29 14:37:43.662169 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-HTML-entities.html [Mon Aug 29 14:37:43.765750 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-ampersand.html [Mon Aug 29 14:37:43.864403 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-control-char2.html [Mon Aug 29 14:37:43.934711 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-control-char.html [Mon Aug 29 14:37:44.025360 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-null-char.html [Mon Aug 29 14:37:44.117875 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-one-plus-one.html [Mon Aug 29 14:37:44.267893 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-url-encoded.html [Mon Aug 29 14:37:44.362217 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link.html [Mon Aug 29 14:37:44.456098 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick-ampersand.html [Mon Aug 29 14:37:44.554459 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick-control-char.html [Mon Aug 29 14:37:44.633197 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick-entities.html [Mon Aug 29 14:37:44.723757 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick-null-char.html [Mon Aug 29 14:37:44.820858 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick.html [Mon Aug 29 14:37:44.935978 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-opens-new-window.html [Mon Aug 29 14:37:45.122464 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-HTML.html [Mon Aug 29 14:37:45.215843 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-1.html [Mon Aug 29 14:37:45.306880 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-2.html [Mon Aug 29 14:37:45.405457 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-3.html [Mon Aug 29 14:37:45.484205 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-4.html [Mon Aug 29 14:37:45.577034 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-5.html [Mon Aug 29 14:37:45.676399 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-6.html [Mon Aug 29 14:37:45.773416 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-7.html [Mon Aug 29 14:37:45.875371 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-8.html [Mon Aug 29 14:37:45.945937 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-9.html [Mon Aug 29 14:37:46.046986 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/meta-tag-http-refresh-javascript-url.html [Mon Aug 29 14:37:46.150333 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/meta-tag-http-refresh-x-frame-options-ignored.html [Mon Aug 29 14:37:46.237052 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/no-protection-script-tag.html [Mon Aug 29 14:37:46.391287 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-embed-tag-control-char.html [Mon Aug 29 14:37:46.484575 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-embed-tag-null-char.html [Mon Aug 29 14:37:46.578765 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-embed-tag.html [Mon Aug 29 14:37:46.758879 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-tag-javascript-url.html [Mon Aug 29 14:37:46.856557 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-tag.html [Mon Aug 29 14:37:46.934600 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-attribute-body.html [Mon Aug 29 14:37:47.034050 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-event-handler-iframe.html [Mon Aug 29 14:37:47.157139 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-iframe-src-01.html [Mon Aug 29 14:37:47.237006 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-iframe-src-02.html [Mon Aug 29 14:37:47.343471 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-iframe-src-03.html [Mon Aug 29 14:37:47.343550 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-iframe-src-03.html [Mon Aug 29 14:37:47.450966 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-script-src-01.html [Mon Aug 29 14:37:47.540992 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-script-src-02.html [Mon Aug 29 14:37:47.649960 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-script-src-03.html [Mon Aug 29 14:37:47.749770 2016] [cgi:error] [pid 1617] [client 127.0.0.1:37370] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-script-src-04.html [Mon Aug 29 14:37:47.854648 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 14:37:47.925410 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-01.html [Mon Aug 29 14:37:47.925514 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-01.html [Mon Aug 29 14:37:47.997704 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-02.html [Mon Aug 29 14:37:48.096433 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-03.html [Mon Aug 29 14:37:48.096511 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-03.html [Mon Aug 29 14:37:48.199383 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-01.html [Mon Aug 29 14:37:48.199436 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-01.html [Mon Aug 29 14:37:48.288383 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-02.html [Mon Aug 29 14:37:48.288447 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-02.html [Mon Aug 29 14:37:48.386776 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-03.html [Mon Aug 29 14:37:48.386834 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-03.html [Mon Aug 29 14:37:48.498315 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-long.html [Mon Aug 29 14:37:48.587066 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-noquotes-tab-slash-chars.html [Mon Aug 29 14:37:48.651639 2016] [cgi:error] [pid 29124] [client 127.0.0.1:37254] End of script output before headers: access-control-basic-get-fail-non-simple.cgi, referer: http://127.0.0.1:8000/xmlhttprequest/workers/resources/access-control-basic-get-fail-non-simple.js [Mon Aug 29 14:37:48.679280 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-noquotes.html [Mon Aug 29 14:37:48.721709 2016] [cgi:error] [pid 29567] [client 127.0.0.1:37980] AH01215: Use of uninitialized value $ENV{"HTTP_X_TEST_HEADER1"} in concatenation (.) or string at /home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/web-apps/004-test.cgi line 4., referer: http://127.0.0.1:8000/xmlhttprequest/web-apps/004.html [Mon Aug 29 14:37:48.801356 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-01.html [Mon Aug 29 14:37:48.801424 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-01.html [Mon Aug 29 14:37:48.890168 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-02.html [Mon Aug 29 14:37:48.890243 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-02.html [Mon Aug 29 14:37:48.977560 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-03.html [Mon Aug 29 14:37:48.977641 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-03.html [Mon Aug 29 14:37:49.070296 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape.html [Mon Aug 29 14:37:49.157141 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-inject.html [Mon Aug 29 14:37:49.335623 2016] [cgi:error] [pid 1238] [client 127.0.0.1:37392] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/report-script-tag-full-block.html [Mon Aug 29 14:37:49.435996 2016] [cgi:error] [pid 29151] [client 127.0.0.1:38046] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/report-script-tag-replace-state.html [Mon Aug 29 14:37:49.536488 2016] [cgi:error] [pid 29150] [client 127.0.0.1:38052] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/report-script-tag.html [Mon Aug 29 14:37:49.648212 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char2.html [Mon Aug 29 14:37:49.648285 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char2.html [Mon Aug 29 14:37:49.735022 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode.html [Mon Aug 29 14:37:49.846306 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char-twice-url-encode.html [Mon Aug 29 14:37:49.846373 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char-twice-url-encode.html [Mon Aug 29 14:37:49.935614 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char.html [Mon Aug 29 14:37:49.935672 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char.html [Mon Aug 29 14:37:50.022531 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 20, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-addslashes-backslash.html [Mon Aug 29 14:37:50.115546 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 20, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-addslashes-double-quote.html [Mon Aug 29 14:37:50.198359 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 20, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-addslashes-null-char.html [Mon Aug 29 14:37:50.280104 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 20, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-addslashes-single-quote.html [Mon Aug 29 14:37:50.359555 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-control-char.html [Mon Aug 29 14:37:50.446067 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-convoluted.html [Mon Aug 29 14:37:50.530616 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-entities.html [Mon Aug 29 14:37:50.620075 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-expression-follows.html [Mon Aug 29 14:37:50.697897 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag2.html [Mon Aug 29 14:37:50.697963 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag2.html [Mon Aug 29 14:37:50.698019 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag2.html [Mon Aug 29 14:37:50.794561 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag3.html [Mon Aug 29 14:37:50.794615 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag3.html [Mon Aug 29 14:37:50.794651 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag3.html [Mon Aug 29 14:37:50.895969 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag.html [Mon Aug 29 14:37:50.959998 2016] [cgi:error] [pid 1148] [client 127.0.0.1:37660] End of script output before headers: access-control-basic-get-fail-non-simple.cgi, referer: http://127.0.0.1:8000/xmlhttprequest/access-control-basic-get-fail-non-simple.html [Mon Aug 29 14:37:51.006640 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-near-start.html [Mon Aug 29 14:37:51.125763 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-null-char.html [Mon Aug 29 14:37:51.223703 2016] [cgi:error] [pid 29108] [client 127.0.0.1:37688] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-open-redirect.html [Mon Aug 29 14:37:51.330325 2016] [cgi:error] [pid 1236] [client 127.0.0.1:38146] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-post-control-char.html [Mon Aug 29 14:37:51.402660 2016] [cgi:error] [pid 1130] [client 127.0.0.1:38148] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-post-null-char.html [Mon Aug 29 14:37:51.476847 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-post.html [Mon Aug 29 14:37:51.553870 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-redirect.html [Mon Aug 29 14:37:52.078572 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode2.html [Mon Aug 29 14:37:52.174330 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode3.html [Mon Aug 29 14:37:52.174436 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: Wide character in print at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl line 76., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode3.html [Mon Aug 29 14:37:52.278522 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode4.html [Mon Aug 29 14:37:52.368959 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode5.html [Mon Aug 29 14:37:52.447079 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair.html [Mon Aug 29 14:37:52.543549 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode.html [Mon Aug 29 14:37:52.651002 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-actual-comma.html [Mon Aug 29 14:37:52.740870 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-callbacks.html [Mon Aug 29 14:37:52.862316 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-01.html [Mon Aug 29 14:37:52.862379 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-01.html [Mon Aug 29 14:37:52.862429 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-01.html [Mon Aug 29 14:37:52.961232 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-02.html [Mon Aug 29 14:37:52.961297 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-02.html [Mon Aug 29 14:37:52.961349 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-02.html [Mon Aug 29 14:37:53.052140 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-fancy-unicode.html [Mon Aug 29 14:37:53.150050 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-injected-comment.html [Mon Aug 29 14:37:53.150113 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-injected-comment.html [Mon Aug 29 14:37:53.150154 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-injected-comment.html [Mon Aug 29 14:37:53.238364 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-invalid-closing-tag.html [Mon Aug 29 14:37:53.238430 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-invalid-closing-tag.html [Mon Aug 29 14:37:53.322893 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-invalid-url-encoding.html [Mon Aug 29 14:37:53.418391 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-control-char.html [Mon Aug 29 14:37:53.501384 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url2.html [Mon Aug 29 14:37:53.501454 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url2.html [Mon Aug 29 14:37:53.501506 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url2.html [Mon Aug 29 14:37:53.587320 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url3.html [Mon Aug 29 14:37:53.587371 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url3.html [Mon Aug 29 14:37:53.587408 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url3.html [Mon Aug 29 14:37:53.680184 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url.html [Mon Aug 29 14:37:53.774477 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-double-quote.html [Mon Aug 29 14:37:53.818212 2016] [:error] [pid 32670] [client 127.0.0.1:38236] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/redirect.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/cross-origin-redirect-responseURL.html [Mon Aug 29 14:37:53.820765 2016] [:error] [pid 32670] [client 127.0.0.1:38236] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/redirect.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/cross-origin-redirect-responseURL.html [Mon Aug 29 14:37:53.822130 2016] [:error] [pid 32670] [client 127.0.0.1:38236] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/redirect.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/cross-origin-redirect-responseURL.html [Mon Aug 29 14:37:53.877988 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-entities.html [Mon Aug 29 14:37:53.972437 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-no-quote.html [Mon Aug 29 14:37:54.051891 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-null-char.html [Mon Aug 29 14:37:54.139544 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-relative-scheme.html [Mon Aug 29 14:37:54.245318 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-same-host-with-query.html [Mon Aug 29 14:37:54.353706 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-same-host.html [Mon Aug 29 14:37:54.446427 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-01.html [Mon Aug 29 14:37:54.446512 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-01.html [Mon Aug 29 14:37:54.446569 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-01.html [Mon Aug 29 14:37:54.547176 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-02.html [Mon Aug 29 14:37:54.547227 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-02.html [Mon Aug 29 14:37:54.547264 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-02.html [Mon Aug 29 14:37:54.640324 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-03.html [Mon Aug 29 14:37:54.640375 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-03.html [Mon Aug 29 14:37:54.640412 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-03.html [Mon Aug 29 14:37:54.728715 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source.html [Mon Aug 29 14:37:54.814800 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode.html [Mon Aug 29 14:37:54.896133 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment2.html [Mon Aug 29 14:37:54.896197 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment2.html [Mon Aug 29 14:37:54.896246 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment2.html [Mon Aug 29 14:37:54.993200 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment3.html [Mon Aug 29 14:37:54.993277 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment3.html [Mon Aug 29 14:37:54.993326 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment3.html [Mon Aug 29 14:37:55.106811 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment4.html [Mon Aug 29 14:37:55.150948 2016] [:error] [pid 29126] [client 127.0.0.1:38318] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/content.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/loadstart-event-init.html [Mon Aug 29 14:37:55.152633 2016] [:error] [pid 32505] [client 127.0.0.1:38320] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/content.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/loadstart-event-init.html [Mon Aug 29 14:37:55.206439 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment5.html [Mon Aug 29 14:37:55.206509 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment5.html [Mon Aug 29 14:37:55.206568 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment5.html [Mon Aug 29 14:37:55.296352 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment-U2028.html [Mon Aug 29 14:37:55.392652 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment.html [Mon Aug 29 14:37:55.392716 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment.html [Mon Aug 29 14:37:55.392767 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment.html [Mon Aug 29 14:37:55.501882 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-script-and-urlencode.html [Mon Aug 29 14:37:55.590081 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag.html [Mon Aug 29 14:37:55.655031 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/svg-animate.html [Mon Aug 29 14:37:55.764777 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/svg-script-tag.html [Mon Aug 29 14:37:56.057619 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-filter-bypass-big5.html [Mon Aug 29 14:37:56.057699 2016] [cgi:error] [pid 481] [client 127.0.0.1:38150] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-filter-bypass-big5.html [Mon Aug 29 14:37:56.303332 2016] [cgi:error] [pid 1206] [client 127.0.0.1:38372] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-filter-bypass-sjis.html [Mon Aug 29 14:37:56.303411 2016] [cgi:error] [pid 1206] [client 127.0.0.1:38372] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-filter-bypass-sjis.html [Mon Aug 29 14:37:56.477425 2016] [cgi:error] [pid 32222] [client 127.0.0.1:38374] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 14:37:56.551832 2016] [cgi:error] [pid 29464] [client 127.0.0.1:38376] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-protection-parsing-02.html [Mon Aug 29 14:37:56.628251 2016] [cgi:error] [pid 29464] [client 127.0.0.1:38376] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-protection-parsing-03.html [Mon Aug 29 14:37:56.706280 2016] [cgi:error] [pid 29464] [client 127.0.0.1:38376] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-protection-parsing-04.html [Mon Aug 29 14:37:56.710962 2016] [:error] [pid 32208] [client 127.0.0.1:38378] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/nonesuch.php' not found or unable to stat, referer: http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/xss-protection-parsing-04.html¬ifyDone=1&valid-header=4&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message%20and%20no%20JavaScript%20alert()%20then%20the%20test%20PASSED.%3C/p%3E [Mon Aug 29 14:37:57.228736 2016] [:error] [pid 29562] [client 127.0.0.1:38476] PHP Warning: Header may not contain NUL bytes in /home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/access-control-allow-lists.php on line 6, referer: http://localhost:8000/xmlhttprequest/resources/origin-exact-matching-iframe.html [Mon Aug 29 14:37:57.235959 2016] [:error] [pid 29562] [client 127.0.0.1:38476] PHP Warning: Header may not contain NUL bytes in /home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/access-control-allow-lists.php on line 6, referer: http://localhost:8000/xmlhttprequest/resources/origin-exact-matching-iframe.html [Mon Aug 29 14:38:00.768813 2016] [cgi:error] [pid 32505] [client 127.0.0.1:38664] AH01215: Could not get query, referer: http://127.0.0.1:8000/xmlhttprequest/send-undefined-and-null.html [Mon Aug 29 14:38:00.772089 2016] [cgi:error] [pid 32671] [client 127.0.0.1:38666] AH01215: Could not get query, referer: http://127.0.0.1:8000/xmlhttprequest/send-undefined-and-null.html [Mon Aug 29 14:38:11.076777 2016] [cgi:error] [pid 31982] [client 127.0.0.1:38744] AH01215: (13)Permission denied: exec of '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/noContentLength.cgi' failed, referer: http://127.0.0.1:8000/xmlhttprequest/xmlhttprequest-no-content-length-onProgress.html [Mon Aug 29 14:38:11.077062 2016] [cgi:error] [pid 31982] [client 127.0.0.1:38744] End of script output before headers: noContentLength.cgi, referer: http://127.0.0.1:8000/xmlhttprequest/xmlhttprequest-no-content-length-onProgress.html [Mon Aug 29 14:38:47.885240 2016] [:error] [pid 29126] [client 127.0.0.1:38860] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/404image.php' not found or unable to stat [Mon Aug 29 14:38:47.982670 2016] [:error] [pid 1238] [client 127.0.0.1:38890] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/resources/green-if-referrer-is-origin.php' not found or unable to stat [Mon Aug 29 14:38:48.266538 2016] [:error] [pid 1130] [client 127.0.0.1:38900] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/svg/resources/broken-image.php' not found or unable to stat [Mon Aug 29 14:38:49.289932 2016] [:error] [pid 29126] [client 127.0.0.1:38860] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/resources/green-if-referrer-is-origin.php' not found or unable to stat [Mon Aug 29 14:38:49.290524 2016] [:error] [pid 29390] [client 127.0.0.1:38902] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/resources/green-if-no-referrer.php' not found or unable to stat [Mon Aug 29 14:38:49.718926 2016] [:error] [pid 1238] [client 127.0.0.1:38890] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/resources/green-if-referrer-is-full-url.php' not found or unable to stat [Mon Aug 29 14:46:02.473400 2016] [mpm_prefork:notice] [pid 23483] AH00169: caught SIGTERM, shutting down [Mon Aug 29 14:46:43.685470 2016] [ssl:warn] [pid 29365] AH01909: 127.0.0.1:443:0 server certificate does NOT include an ID which matches the server name [Mon Aug 29 14:46:43.694641 2016] [ssl:warn] [pid 29366] AH01873: Init: Session Cache is not configured [hint: SSLSessionCache] [Mon Aug 29 14:46:43.694813 2016] [ssl:warn] [pid 29366] AH01909: 127.0.0.1:443:0 server certificate does NOT include an ID which matches the server name [Mon Aug 29 14:46:43.705736 2016] [mpm_prefork:notice] [pid 29366] AH00163: Apache/2.4.10 (Debian) OpenSSL/1.0.2d PHP/5.6.20-0+deb8u1 configured -- resuming normal operations [Mon Aug 29 14:46:43.705765 2016] [core:notice] [pid 29366] AH00094: Command line: '/usr/sbin/apache2 -f /home/clopez/webkit/webkit/layout-test-results/httpd.conf -C DocumentRoot "/home/clopez/webkit/webkit/LayoutTests/http/tests" -c TypesConfig "/home/clopez/webkit/webkit/LayoutTests/http/conf/mime.types" -c PHPINIDir "/home/clopez/webkit/webkit/LayoutTests/http/conf" -c CustomLog "/home/clopez/webkit/webkit/layout-test-results/access_log.txt" common -c ErrorLog "/home/clopez/webkit/webkit/layout-test-results/error_log.txt" -c PidFile /tmp/WebKit/httpd.pid -c Alias /js-test-resources "/home/clopez/webkit/webkit/LayoutTests/resources" -c Alias /media-resources "/home/clopez/webkit/webkit/LayoutTests/media" -c Alias /resources/testharness.css "/home/clopez/webkit/webkit/LayoutTests/resources/testharness.css" -c Alias /resources/testharness.js "/home/clopez/webkit/webkit/LayoutTests/resources/testharness.js" -c Alias /resources/testharnessreport.js "/home/clopez/webkit/webkit/LayoutTests/resources/testharnessreport.js" -C User "clopez" -C Listen 127.0.0.1:8000 -C Listen [::1]:8000 -C Listen 127.0.0.1:8080 -C Listen [::1]:8080 -C Listen 127.0.0.1:8443 -C Listen [::1]:8443 -c SSLCertificateFile /home/clopez/webkit/webkit/LayoutTests/http/conf/webkit-httpd.pem' [Mon Aug 29 14:48:47.690661 2016] [:error] [pid 29368] [client 127.0.0.1:54746] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-same-origin.html [Mon Aug 29 14:48:54.591645 2016] [:error] [pid 29761] [client 127.0.0.1:50300] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: https://127.0.0.1:8443/navigation/ping-attribute/area-cross-origin-from-https.html [Mon Aug 29 14:49:01.454657 2016] [:error] [pid 29729] [client 127.0.0.1:50308] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-cross-origin-from-https.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: https://127.0.0.1:8443/navigation/ping-attribute/anchor-cross-origin-from-https.html [Mon Aug 29 14:49:08.345096 2016] [:error] [pid 29760] [client 127.0.0.1:54770] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-cross-origin.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-cross-origin.html [Mon Aug 29 14:49:15.277260 2016] [:error] [pid 29761] [client 127.0.0.1:54774] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-cookie.html [Mon Aug 29 14:49:22.128409 2016] [:error] [pid 29368] [client 127.0.0.1:54778] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-same-origin.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-same-origin.html [Mon Aug 29 14:49:29.032396 2016] [:error] [pid 29729] [client 127.0.0.1:54782] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-cross-origin.html [Mon Aug 29 14:49:35.892849 2016] [:error] [pid 29760] [client 127.0.0.1:54786] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-cookie.html [Mon Aug 29 14:51:46.667607 2016] [mpm_prefork:notice] [pid 29366] AH00169: caught SIGTERM, shutting down