[Mon Aug 29 15:31:28.371673 2016] [ssl:warn] [pid 19922] AH01909: 127.0.0.1:443:0 server certificate does NOT include an ID which matches the server name [Mon Aug 29 15:31:28.380556 2016] [ssl:warn] [pid 19923] AH01873: Init: Session Cache is not configured [hint: SSLSessionCache] [Mon Aug 29 15:31:28.380723 2016] [ssl:warn] [pid 19923] AH01909: 127.0.0.1:443:0 server certificate does NOT include an ID which matches the server name [Mon Aug 29 15:31:28.391262 2016] [mpm_prefork:notice] [pid 19923] AH00163: Apache/2.4.10 (Debian) OpenSSL/1.0.2d PHP/5.6.20-0+deb8u1 configured -- resuming normal operations [Mon Aug 29 15:31:28.391279 2016] [core:notice] [pid 19923] AH00094: Command line: '/usr/sbin/apache2 -f /home/clopez/webkit/webkit/layout-test-results/httpd.conf -C DocumentRoot "/home/clopez/webkit/webkit/LayoutTests/http/tests" -c TypesConfig "/home/clopez/webkit/webkit/LayoutTests/http/conf/mime.types" -c PHPINIDir "/home/clopez/webkit/webkit/LayoutTests/http/conf" -c CustomLog "/home/clopez/webkit/webkit/layout-test-results/access_log.txt" common -c ErrorLog "/home/clopez/webkit/webkit/layout-test-results/error_log.txt" -c PidFile /tmp/WebKit/httpd.pid -c Alias /js-test-resources "/home/clopez/webkit/webkit/LayoutTests/resources" -c Alias /media-resources "/home/clopez/webkit/webkit/LayoutTests/media" -c Alias /resources/testharness.css "/home/clopez/webkit/webkit/LayoutTests/resources/testharness.css" -c Alias /resources/testharness.js "/home/clopez/webkit/webkit/LayoutTests/resources/testharness.js" -c Alias /resources/testharnessreport.js "/home/clopez/webkit/webkit/LayoutTests/resources/testharnessreport.js" -C User "clopez" -C Listen 127.0.0.1:8000 -C Listen [::1]:8000 -C Listen 127.0.0.1:8080 -C Listen [::1]:8080 -C Listen 127.0.0.1:8443 -C Listen [::1]:8443 -c SSLCertificateFile /home/clopez/webkit/webkit/LayoutTests/http/conf/webkit-httpd.pem' [Mon Aug 29 15:37:36.378671 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:36.484133 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:36.588789 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:36.674603 2016] [:error] [pid 26381] [client 127.0.0.1:47016] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/download-json-with-delay.php' not found or unable to stat, referer: http://127.0.0.1:8000/fetch/clone-response-body.html [Mon Aug 29 15:37:36.692941 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:36.797660 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:36.902171 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.007034 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.111463 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.217477 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.323362 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.430139 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.536600 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.642429 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.747892 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.854037 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:37.959674 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:38.064719 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:38.081407 2016] [:error] [pid 26426] [client 127.0.0.1:47074] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/css/resources/delayedCircle.php' not found or unable to stat, referer: http://127.0.0.1:8000/css/object-fit-delayed-img-svg.html [Mon Aug 29 15:37:38.169575 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:38.274049 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:38.381748 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:38.485327 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:38.589682 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:38.693650 2016] [:error] [pid 26428] [client 127.0.0.1:47042] PHP Warning: unlink(/tmp/appcache_fail-on-update-2_state): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/appcache/resources/fail-on-update-2.php on line 28, referer: http://127.0.0.1:8000/appcache/fail-on-update-2.html [Mon Aug 29 15:37:58.558307 2016] [:error] [pid 26420] [client 127.0.0.1:47880] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-cookie.html [Mon Aug 29 15:38:00.361708 2016] [negotiation:error] [pid 26325] [client 127.0.0.1:47920] AH00687: Negotiation: discovered file(s) matching request: /home/clopez/webkit/webkit/LayoutTests/http/tests/misc/resources/acid3/support-a.png (None could be negotiated)., referer: http://127.0.0.1:8000/misc/acid3.html [Mon Aug 29 15:38:03.074551 2016] [:error] [pid 26427] [client 127.0.0.1:47950] PHP Warning: unlink(/tmp/-navigation-image-load-in-pagehide-handler.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/image-load-in-pagehide-handler.html [Mon Aug 29 15:38:03.409101 2016] [:error] [pid 26427] [client 127.0.0.1:47950] PHP Warning: unlink(/tmp/-navigation-image-load-in-unload-handler.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/image-load-in-unload-handler.html [Mon Aug 29 15:38:05.843078 2016] [cgi:error] [pid 29238] [client 127.0.0.1:47968] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/plugins/post-url-file.html [Mon Aug 29 15:38:05.843137 2016] [cgi:error] [pid 29238] [client 127.0.0.1:47968] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/plugins/post-url-file.html [Mon Aug 29 15:38:05.996375 2016] [:error] [pid 26697] [client 127.0.0.1:43516] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-cross-origin-from-https.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: https://127.0.0.1:8443/navigation/ping-attribute/anchor-cross-origin-from-https.html [Mon Aug 29 15:38:13.357810 2016] [:error] [pid 29328] [client 127.0.0.1:48070] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-cross-origin.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-cross-origin.html [Mon Aug 29 15:38:20.389186 2016] [:error] [pid 26428] [client 127.0.0.1:48164] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-same-origin.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-same-origin.html [Mon Aug 29 15:38:28.953145 2016] [:error] [pid 30225] [client 127.0.0.1:48236] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-cookie.html [Mon Aug 29 15:38:30.402605 2016] [:error] [pid 30230] [client 127.0.0.1:48246] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/slow-loading-script.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/slow-loading-page-with-slow-script.php [Mon Aug 29 15:38:36.119179 2016] [:error] [pid 30225] [client 127.0.0.1:43898] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: https://127.0.0.1:8443/navigation/ping-attribute/area-cross-origin-from-https.html [Mon Aug 29 15:38:36.683039 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48328] AH01215: Use of uninitialized value $ENV{"HTTP_UPGRADE_INSECURE_REQUESTS"} in concatenation (.) or string at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/echo-https-header.pl line 8., referer: http://127.0.0.1:8000/security/contentSecurityPolicy/upgrade-insecure-requests/https-header-subresource.html [Mon Aug 29 15:38:38.621169 2016] [:error] [pid 30639] [client 127.0.0.1:48372] PHP Warning: filesize(): stat failed for ../../../resources/square.png in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 3, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 15:38:38.621209 2016] [:error] [pid 30639] [client 127.0.0.1:48372] PHP Warning: fopen(../../../resources/square.png): failed to open stream: No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 4, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 15:38:38.621216 2016] [:error] [pid 30639] [client 127.0.0.1:48372] PHP Warning: fread() expects parameter 1 to be resource, boolean given in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 5, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 15:38:38.621221 2016] [:error] [pid 30639] [client 127.0.0.1:48372] PHP Warning: fclose() expects parameter 1 to be resource, boolean given in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 6, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 15:38:38.621226 2016] [:error] [pid 30639] [client 127.0.0.1:48372] PHP Warning: Cannot modify header information - headers already sent by (output started at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php:3) in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 8, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 15:38:38.621235 2016] [:error] [pid 30639] [client 127.0.0.1:48372] PHP Warning: Cannot modify header information - headers already sent by (output started at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php:3) in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 9, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 15:38:38.621239 2016] [:error] [pid 30639] [client 127.0.0.1:48372] PHP Warning: Cannot modify header information - headers already sent by (output started at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php:3) in /home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/image-document-default-src-none-iframe.php on line 10, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/image-document-default-src-none.html [Mon Aug 29 15:38:41.829543 2016] [cgi:error] [pid 30079] [client 127.0.0.1:48452] AH01215: Use of uninitialized value $ENV{"HTTP_ORIGIN"} in concatenation (.) or string at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/originHeader/resources/print-origin.cgi line 8., referer: http://127.0.0.1:8000/security/originHeader/origin-header-for-get.html [Mon Aug 29 15:38:43.136376 2016] [:error] [pid 29326] [client 127.0.0.1:48486] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-cross-origin.html [Mon Aug 29 15:38:43.343456 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/base-href-control-char.html [Mon Aug 29 15:38:43.464447 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/base-href-null-char.html [Mon Aug 29 15:38:43.555509 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/base-href-scheme-relative.html [Mon Aug 29 15:38:43.614787 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/base-href.html [Mon Aug 29 15:38:43.675362 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/block-does-not-leak-location.html [Mon Aug 29 15:38:43.723164 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/block-does-not-leak-referrer.html [Mon Aug 29 15:38:43.786245 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/block-does-not-leak-that-page-was-blocked-using-empty-data-url.html [Mon Aug 29 15:38:43.882356 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/cookie-injection.html [Mon Aug 29 15:38:43.973664 2016] [cgi:error] [pid 30168] [client 127.0.0.1:48366] script not found or unable to stat: /home/clopez/webkit/webkit/LayoutTests/http/tests/plugins/resources/mock-plugin-with-csp.pl, referer: http://127.0.0.1:8000/security/contentSecurityPolicy/plugin-in-iframe-with-csp.html [Mon Aug 29 15:38:44.368375 2016] [cgi:error] [pid 30170] [client 127.0.0.1:46382] AH01215: Use of uninitialized value $ENV{"HTTP_SET_COOKIE"} in concatenation (.) or string at /home/clopez/webkit/webkit/LayoutTests/http/tests/cookies/resources/setCookies.cgi line 11., referer: http://127.0.0.1:8000/security/contentSecurityPolicy/report-cross-origin-no-cookies.php [Mon Aug 29 15:38:44.411463 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-code-attribute-2.html [Mon Aug 29 15:38:44.451972 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-code-attribute.html [Mon Aug 29 15:38:44.492321 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-control-char.html [Mon Aug 29 15:38:44.538701 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-in-path-unterminated.html [Mon Aug 29 15:38:44.538771 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-in-path-unterminated.html [Mon Aug 29 15:38:44.588925 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-javascript-url.html [Mon Aug 29 15:38:44.822231 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag-null-char.html [Mon Aug 29 15:38:44.992958 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/embed-tag.html [Mon Aug 29 15:38:45.043171 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/faux-script1.html [Mon Aug 29 15:38:45.083110 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/faux-script2.html [Mon Aug 29 15:38:45.122233 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/faux-script3.html [Mon Aug 29 15:38:45.164535 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/form-action.html [Mon Aug 29 15:38:45.207447 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/formaction-on-button.html [Mon Aug 29 15:38:45.258328 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/formaction-on-input.html [Mon Aug 29 15:38:45.299624 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/frameset-injection.html [Mon Aug 29 15:38:45.341988 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-base-href.html [Mon Aug 29 15:38:45.387914 2016] [cgi:error] [pid 30114] [client 127.0.0.1:48464] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 15:38:45.430456 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-iframe-javascript-url.html [Mon Aug 29 15:38:45.476212 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-iframe-no-inherit.php [Mon Aug 29 15:38:45.518895 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-javascript-link.html [Mon Aug 29 15:38:45.561237 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-link-onclick.html [Mon Aug 29 15:38:45.602701 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-object-tag.html [Mon Aug 29 15:38:45.648356 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 15:38:45.687913 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-script-tag-cross-domain.html [Mon Aug 29 15:38:45.728280 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-script-tag-with-source.html [Mon Aug 29 15:38:45.770052 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/full-block-script-tag.html [Mon Aug 29 15:38:45.815401 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 15:38:45.853350 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-injection-allowed-2.html [Mon Aug 29 15:38:45.894220 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-injection-allowed-3.html [Mon Aug 29 15:38:45.939604 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-injection-allowed.html [Mon Aug 29 15:38:45.983532 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-injection.html [Mon Aug 29 15:38:46.043339 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-more-encoding.html [Mon Aug 29 15:38:46.090770 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-twice-url-encode2.html [Mon Aug 29 15:38:46.142289 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-twice-url-encode3.html [Mon Aug 29 15:38:46.188105 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-twice-url-encode.html [Mon Aug 29 15:38:46.230855 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url-url-encoded.html [Mon Aug 29 15:38:46.274126 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-javascript-url.html [Mon Aug 29 15:38:46.322887 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-onload-GBK-char.html [Mon Aug 29 15:38:46.322956 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-onload-GBK-char.html [Mon Aug 29 15:38:46.374964 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-onload-in-svg-tag.html [Mon Aug 29 15:38:46.511638 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/iframe-srcdoc.html [Mon Aug 29 15:38:46.556384 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-GBK-char.html [Mon Aug 29 15:38:46.556434 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-GBK-char.html [Mon Aug 29 15:38:46.599145 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-accented-char.html [Mon Aug 29 15:38:46.644515 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding.html [Mon Aug 29 15:38:46.692418 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-non-ASCII-char2.html [Mon Aug 29 15:38:46.733108 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding.html [Mon Aug 29 15:38:46.776077 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-non-ASCII-char.html [Mon Aug 29 15:38:46.816273 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-onerror-tricky.html [Mon Aug 29 15:38:46.857236 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-tag-with-comma.html [Mon Aug 29 15:38:46.857291 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-tag-with-comma.html [Mon Aug 29 15:38:46.857340 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/img-tag-with-comma.html [Mon Aug 29 15:38:46.898128 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/inline-event-HTML-entities.html [Mon Aug 29 15:38:46.946378 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-HTML-entities-control-char.html [Mon Aug 29 15:38:46.995035 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-HTML-entities-named.html [Mon Aug 29 15:38:47.042319 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-HTML-entities-null-char.html [Mon Aug 29 15:38:47.104995 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-HTML-entities.html [Mon Aug 29 15:38:47.274176 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-ampersand.html [Mon Aug 29 15:38:47.524493 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-control-char2.html [Mon Aug 29 15:38:47.617821 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-control-char.html [Mon Aug 29 15:38:47.720315 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-null-char.html [Mon Aug 29 15:38:47.820657 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-one-plus-one.html [Mon Aug 29 15:38:48.061687 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link-url-encoded.html [Mon Aug 29 15:38:48.102307 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 25, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/javascript-link.html [Mon Aug 29 15:38:48.142195 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick-ampersand.html [Mon Aug 29 15:38:48.184087 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick-control-char.html [Mon Aug 29 15:38:48.226014 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick-entities.html [Mon Aug 29 15:38:48.266443 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick-null-char.html [Mon Aug 29 15:38:48.308052 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-onclick.html [Mon Aug 29 15:38:48.356297 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/link-opens-new-window.html [Mon Aug 29 15:38:48.412472 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-HTML.html [Mon Aug 29 15:38:48.457690 2016] [cgi:error] [pid 30649] [client 127.0.0.1:48402] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-1.html [Mon Aug 29 15:38:48.505402 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-2.html [Mon Aug 29 15:38:48.546209 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-3.html [Mon Aug 29 15:38:48.590278 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-4.html [Mon Aug 29 15:38:48.646592 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-5.html [Mon Aug 29 15:38:48.695397 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-6.html [Mon Aug 29 15:38:48.745912 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-7.html [Mon Aug 29 15:38:48.786179 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-8.html [Mon Aug 29 15:38:48.826870 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/malformed-xss-protection-header-9.html [Mon Aug 29 15:38:48.868969 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/meta-tag-http-refresh-javascript-url.html [Mon Aug 29 15:38:48.908487 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/meta-tag-http-refresh-x-frame-options-ignored.html [Mon Aug 29 15:38:48.952044 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/no-protection-script-tag.html [Mon Aug 29 15:38:49.002749 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-embed-tag-control-char.html [Mon Aug 29 15:38:49.053025 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-embed-tag-null-char.html [Mon Aug 29 15:38:49.095660 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-embed-tag.html [Mon Aug 29 15:38:49.195117 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-tag-javascript-url.html [Mon Aug 29 15:38:49.254650 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/object-tag.html [Mon Aug 29 15:38:49.589007 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-attribute-body.html [Mon Aug 29 15:38:49.649783 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-event-handler-iframe.html [Mon Aug 29 15:38:49.778667 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-iframe-src-01.html [Mon Aug 29 15:38:49.984073 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-iframe-src-02.html [Mon Aug 29 15:38:50.282998 2016] [:error] [pid 30801] [client 127.0.0.1:48592] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-same-origin.html [Mon Aug 29 15:38:50.378027 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-iframe-src-03.html [Mon Aug 29 15:38:50.378084 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-iframe-src-03.html [Mon Aug 29 15:38:50.435108 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-script-src-01.html [Mon Aug 29 15:38:50.490643 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-script-src-02.html [Mon Aug 29 15:38:50.508003 2016] [:error] [pid 30792] [client 127.0.0.1:48420] PHP Warning: Cannot modify header information - headers already sent by (output started at /home/clopez/webkit/webkit/LayoutTests/http/tests/w3c/webperf/resources/blank_page_green_with_allow_timing.php:6) in /home/clopez/webkit/webkit/LayoutTests/http/tests/w3c/webperf/resources/blank_page_green_with_allow_timing.php on line 8, referer: http://127.0.0.1:8000/w3c/webperf/submission/Intel/resource-timing/test_resource_timing_timing_allow_cross_origin_resource_request.html [Mon Aug 29 15:38:50.537659 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-script-src-03.html [Mon Aug 29 15:38:50.586012 2016] [cgi:error] [pid 29324] [client 127.0.0.1:48560] AH01215: CGI::param called in list context from package main line 15, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/open-script-src-04.html [Mon Aug 29 15:38:50.659813 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 15:38:50.707121 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-01.html [Mon Aug 29 15:38:50.707192 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-01.html [Mon Aug 29 15:38:50.761302 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-02.html [Mon Aug 29 15:38:50.805843 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-03.html [Mon Aug 29 15:38:50.805901 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-comment-03.html [Mon Aug 29 15:38:50.851720 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-01.html [Mon Aug 29 15:38:50.851799 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-01.html [Mon Aug 29 15:38:50.907265 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-02.html [Mon Aug 29 15:38:50.907329 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-02.html [Mon Aug 29 15:38:50.952408 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-03.html [Mon Aug 29 15:38:50.952467 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-entity-03.html [Mon Aug 29 15:38:50.992701 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-long.html [Mon Aug 29 15:38:51.032903 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-noquotes-tab-slash-chars.html [Mon Aug 29 15:38:51.075451 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-noquotes.html [Mon Aug 29 15:38:51.112908 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-01.html [Mon Aug 29 15:38:51.112959 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-01.html [Mon Aug 29 15:38:51.154900 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-02.html [Mon Aug 29 15:38:51.154952 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-02.html [Mon Aug 29 15:38:51.191990 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-03.html [Mon Aug 29 15:38:51.192043 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 14, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape-quote-03.html [Mon Aug 29 15:38:51.232872 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-escape.html [Mon Aug 29 15:38:51.271773 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 12, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/property-inject.html [Mon Aug 29 15:38:51.366602 2016] [cgi:error] [pid 30793] [client 127.0.0.1:48584] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/report-script-tag-full-block.html [Mon Aug 29 15:38:51.416740 2016] [cgi:error] [pid 29280] [client 127.0.0.1:48622] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/report-script-tag-replace-state.html [Mon Aug 29 15:38:51.470463 2016] [cgi:error] [pid 30168] [client 127.0.0.1:48628] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/report-script-tag.html [Mon Aug 29 15:38:51.521090 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char2.html [Mon Aug 29 15:38:51.521155 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char2.html [Mon Aug 29 15:38:51.574228 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode.html [Mon Aug 29 15:38:51.623029 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char-twice-url-encode.html [Mon Aug 29 15:38:51.623085 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char-twice-url-encode.html [Mon Aug 29 15:38:51.667013 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char.html [Mon Aug 29 15:38:51.667065 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-Big5-char.html [Mon Aug 29 15:38:51.711453 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 20, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-addslashes-backslash.html [Mon Aug 29 15:38:51.758555 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 20, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-addslashes-double-quote.html [Mon Aug 29 15:38:51.804165 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 20, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-addslashes-null-char.html [Mon Aug 29 15:38:51.868537 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 20, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-addslashes-single-quote.html [Mon Aug 29 15:38:51.916839 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-control-char.html [Mon Aug 29 15:38:51.962603 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-convoluted.html [Mon Aug 29 15:38:52.001268 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-entities.html [Mon Aug 29 15:38:52.040722 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-expression-follows.html [Mon Aug 29 15:38:52.086261 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag2.html [Mon Aug 29 15:38:52.086334 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag2.html [Mon Aug 29 15:38:52.086381 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag2.html [Mon Aug 29 15:38:52.138416 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag3.html [Mon Aug 29 15:38:52.138478 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag3.html [Mon Aug 29 15:38:52.138529 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag3.html [Mon Aug 29 15:38:52.197936 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-inside-svg-tag.html [Mon Aug 29 15:38:52.246948 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-near-start.html [Mon Aug 29 15:38:52.299572 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-null-char.html [Mon Aug 29 15:38:52.350922 2016] [cgi:error] [pid 30170] [client 127.0.0.1:48598] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-open-redirect.html [Mon Aug 29 15:38:52.403695 2016] [cgi:error] [pid 30797] [client 127.0.0.1:48826] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-post-control-char.html [Mon Aug 29 15:38:52.448372 2016] [cgi:error] [pid 30232] [client 127.0.0.1:48842] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-post-null-char.html [Mon Aug 29 15:38:52.494293 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-post.html [Mon Aug 29 15:38:52.539226 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-redirect.html [Mon Aug 29 15:38:52.671093 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode2.html [Mon Aug 29 15:38:52.716893 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode3.html [Mon Aug 29 15:38:52.716980 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: Wide character in print at /home/clopez/webkit/webkit/LayoutTests/http/tests/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl line 76., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode3.html [Mon Aug 29 15:38:52.765757 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode4.html [Mon Aug 29 15:38:52.815571 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode5.html [Mon Aug 29 15:38:52.867209 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair.html [Mon Aug 29 15:38:52.913078 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 76, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-16bit-unicode.html [Mon Aug 29 15:38:52.954758 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-actual-comma.html [Mon Aug 29 15:38:52.996778 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-callbacks.html [Mon Aug 29 15:38:53.047673 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-01.html [Mon Aug 29 15:38:53.047801 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-01.html [Mon Aug 29 15:38:53.047943 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-01.html [Mon Aug 29 15:38:53.100065 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-02.html [Mon Aug 29 15:38:53.100112 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-02.html [Mon Aug 29 15:38:53.100149 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-comma-02.html [Mon Aug 29 15:38:53.147295 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-fancy-unicode.html [Mon Aug 29 15:38:53.199088 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-injected-comment.html [Mon Aug 29 15:38:53.199148 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-injected-comment.html [Mon Aug 29 15:38:53.199185 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-injected-comment.html [Mon Aug 29 15:38:53.245126 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-invalid-closing-tag.html [Mon Aug 29 15:38:53.245197 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-invalid-closing-tag.html [Mon Aug 29 15:38:53.288474 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-invalid-url-encoding.html [Mon Aug 29 15:38:53.335155 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-control-char.html [Mon Aug 29 15:38:53.380880 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url2.html [Mon Aug 29 15:38:53.380944 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url2.html [Mon Aug 29 15:38:53.380996 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url2.html [Mon Aug 29 15:38:53.430515 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url3.html [Mon Aug 29 15:38:53.430585 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url3.html [Mon Aug 29 15:38:53.430652 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url3.html [Mon Aug 29 15:38:53.474205 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-data-url.html [Mon Aug 29 15:38:53.517854 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-double-quote.html [Mon Aug 29 15:38:53.562059 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-entities.html [Mon Aug 29 15:38:53.602567 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-no-quote.html [Mon Aug 29 15:38:53.650016 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-null-char.html [Mon Aug 29 15:38:53.696177 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-relative-scheme.html [Mon Aug 29 15:38:53.748613 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-same-host-with-query.html [Mon Aug 29 15:38:53.792725 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-same-host.html [Mon Aug 29 15:38:53.836133 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-01.html [Mon Aug 29 15:38:53.836200 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-01.html [Mon Aug 29 15:38:53.836240 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-01.html [Mon Aug 29 15:38:53.880244 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-02.html [Mon Aug 29 15:38:53.880314 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-02.html [Mon Aug 29 15:38:53.880363 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-02.html [Mon Aug 29 15:38:53.930846 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-03.html [Mon Aug 29 15:38:53.930928 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-03.html [Mon Aug 29 15:38:53.930975 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source-unterminated-03.html [Mon Aug 29 15:38:53.974710 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-source.html [Mon Aug 29 15:38:54.017446 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode.html [Mon Aug 29 15:38:54.069714 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment2.html [Mon Aug 29 15:38:54.069787 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment2.html [Mon Aug 29 15:38:54.069836 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment2.html [Mon Aug 29 15:38:54.121057 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment3.html [Mon Aug 29 15:38:54.121126 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment3.html [Mon Aug 29 15:38:54.121180 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment3.html [Mon Aug 29 15:38:54.186148 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment4.html [Mon Aug 29 15:38:54.230136 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment5.html [Mon Aug 29 15:38:54.230188 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment5.html [Mon Aug 29 15:38:54.230223 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment5.html [Mon Aug 29 15:38:54.367305 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment-U2028.html [Mon Aug 29 15:38:54.519949 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment.html [Mon Aug 29 15:38:54.519998 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 94, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment.html [Mon Aug 29 15:38:54.520034 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 97, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-comment.html [Mon Aug 29 15:38:54.624166 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag-with-trailing-script-and-urlencode.html [Mon Aug 29 15:38:54.702974 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/script-tag.html [Mon Aug 29 15:38:54.797408 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/svg-animate.html [Mon Aug 29 15:38:54.884538 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/svg-script-tag.html [Mon Aug 29 15:38:55.316353 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-filter-bypass-big5.html [Mon Aug 29 15:38:55.316409 2016] [cgi:error] [pid 29323] [client 127.0.0.1:48844] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-filter-bypass-big5.html [Mon Aug 29 15:38:55.571934 2016] [cgi:error] [pid 30639] [client 127.0.0.1:49288] AH01215: CGI::param called in list context from package main line 69, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-filter-bypass-sjis.html [Mon Aug 29 15:38:55.571986 2016] [cgi:error] [pid 30639] [client 127.0.0.1:49288] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-filter-bypass-sjis.html [Mon Aug 29 15:38:55.835458 2016] [cgi:error] [pid 26428] [client 127.0.0.1:49322] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436. [Mon Aug 29 15:38:56.008554 2016] [cgi:error] [pid 29322] [client 127.0.0.1:49304] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-protection-parsing-02.html [Mon Aug 29 15:38:56.140287 2016] [cgi:error] [pid 29322] [client 127.0.0.1:49304] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-protection-parsing-03.html [Mon Aug 29 15:38:56.371515 2016] [cgi:error] [pid 29322] [client 127.0.0.1:49304] AH01215: CGI::param called in list context from package main line 89, this can lead to vulnerabilities. See the warning in "Fetching the value or values of a single named parameter" at /usr/share/perl5/CGI.pm line 436., referer: http://127.0.0.1:8000/security/xssAuditor/xss-protection-parsing-04.html [Mon Aug 29 15:38:56.373759 2016] [:error] [pid 30170] [client 127.0.0.1:49342] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/nonesuch.php' not found or unable to stat, referer: http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/xss-protection-parsing-04.html¬ifyDone=1&valid-header=4&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message%20and%20no%20JavaScript%20alert()%20then%20the%20test%20PASSED.%3C/p%3E [Mon Aug 29 15:38:56.475995 2016] [cgi:error] [pid 29322] [client 127.0.0.1:49304] AH01215: Use of uninitialized value $ENV{"HTTP_X_TEST_HEADER1"} in concatenation (.) or string at /home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/web-apps/004-test.cgi line 4., referer: http://127.0.0.1:8000/xmlhttprequest/web-apps/004.html [Mon Aug 29 15:38:58.189313 2016] [cgi:error] [pid 26551] [client 127.0.0.1:49412] End of script output before headers: access-control-basic-get-fail-non-simple.cgi, referer: http://127.0.0.1:8000/xmlhttprequest/workers/resources/access-control-basic-get-fail-non-simple.js [Mon Aug 29 15:39:02.084614 2016] [cgi:error] [pid 26551] [client 127.0.0.1:49416] End of script output before headers: access-control-basic-get-fail-non-simple.cgi, referer: http://127.0.0.1:8000/xmlhttprequest/access-control-basic-get-fail-non-simple.html [Mon Aug 29 15:39:04.197118 2016] [:error] [pid 32495] [client 127.0.0.1:49550] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/redirect.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/cross-origin-redirect-responseURL.html [Mon Aug 29 15:39:04.198701 2016] [:error] [pid 32495] [client 127.0.0.1:49550] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/redirect.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/cross-origin-redirect-responseURL.html [Mon Aug 29 15:39:04.201428 2016] [:error] [pid 32495] [client 127.0.0.1:49550] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/redirect.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/cross-origin-redirect-responseURL.html [Mon Aug 29 15:39:05.280280 2016] [:error] [pid 32421] [client 127.0.0.1:49630] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/content.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/loadstart-event-init.html [Mon Aug 29 15:39:05.281725 2016] [:error] [pid 32422] [client 127.0.0.1:49632] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/content.php' not found or unable to stat, referer: http://127.0.0.1:8000/xmlhttprequest/loadstart-event-init.html [Mon Aug 29 15:39:07.079250 2016] [:error] [pid 32422] [client 127.0.0.1:49770] PHP Warning: Header may not contain NUL bytes in /home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/access-control-allow-lists.php on line 6, referer: http://localhost:8000/xmlhttprequest/resources/origin-exact-matching-iframe.html [Mon Aug 29 15:39:07.085050 2016] [:error] [pid 32422] [client 127.0.0.1:49770] PHP Warning: Header may not contain NUL bytes in /home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/access-control-allow-lists.php on line 6, referer: http://localhost:8000/xmlhttprequest/resources/origin-exact-matching-iframe.html [Mon Aug 29 15:39:11.215269 2016] [cgi:error] [pid 29986] [client 127.0.0.1:49954] AH01215: Could not get query, referer: http://127.0.0.1:8000/xmlhttprequest/send-undefined-and-null.html [Mon Aug 29 15:39:11.219896 2016] [cgi:error] [pid 29945] [client 127.0.0.1:49956] AH01215: Could not get query, referer: http://127.0.0.1:8000/xmlhttprequest/send-undefined-and-null.html [Mon Aug 29 15:39:21.227293 2016] [cgi:error] [pid 26693] [client 127.0.0.1:50022] AH01215: (13)Permission denied: exec of '/home/clopez/webkit/webkit/LayoutTests/http/tests/xmlhttprequest/resources/noContentLength.cgi' failed, referer: http://127.0.0.1:8000/xmlhttprequest/xmlhttprequest-no-content-length-onProgress.html [Mon Aug 29 15:39:21.227793 2016] [cgi:error] [pid 26693] [client 127.0.0.1:50022] End of script output before headers: noContentLength.cgi, referer: http://127.0.0.1:8000/xmlhttprequest/xmlhttprequest-no-content-length-onProgress.html [Mon Aug 29 15:39:39.480261 2016] [:error] [pid 26701] [client 127.0.0.1:50160] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/404image.php' not found or unable to stat [Mon Aug 29 15:39:39.507328 2016] [:error] [pid 30711] [client 127.0.0.1:50162] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/resources/green-if-referrer-is-origin.php' not found or unable to stat [Mon Aug 29 15:39:39.678490 2016] [:error] [pid 26550] [client 127.0.0.1:50164] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/svg/resources/broken-image.php' not found or unable to stat [Mon Aug 29 15:39:40.383963 2016] [:error] [pid 26701] [client 127.0.0.1:50160] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/resources/green-if-referrer-is-origin.php' not found or unable to stat [Mon Aug 29 15:39:40.384714 2016] [:error] [pid 30170] [client 127.0.0.1:50168] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/resources/green-if-no-referrer.php' not found or unable to stat [Mon Aug 29 15:39:40.684064 2016] [:error] [pid 30711] [client 127.0.0.1:50162] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/security/resources/green-if-referrer-is-full-url.php' not found or unable to stat [Mon Aug 29 15:47:07.503652 2016] [mpm_prefork:notice] [pid 19923] AH00169: caught SIGTERM, shutting down [Mon Aug 29 15:47:48.731685 2016] [ssl:warn] [pid 27476] AH01909: 127.0.0.1:443:0 server certificate does NOT include an ID which matches the server name [Mon Aug 29 15:47:48.740363 2016] [ssl:warn] [pid 27477] AH01873: Init: Session Cache is not configured [hint: SSLSessionCache] [Mon Aug 29 15:47:48.740533 2016] [ssl:warn] [pid 27477] AH01909: 127.0.0.1:443:0 server certificate does NOT include an ID which matches the server name [Mon Aug 29 15:47:48.768139 2016] [mpm_prefork:notice] [pid 27477] AH00163: Apache/2.4.10 (Debian) OpenSSL/1.0.2d PHP/5.6.20-0+deb8u1 configured -- resuming normal operations [Mon Aug 29 15:47:48.768155 2016] [core:notice] [pid 27477] AH00094: Command line: '/usr/sbin/apache2 -f /home/clopez/webkit/webkit/layout-test-results/httpd.conf -C DocumentRoot "/home/clopez/webkit/webkit/LayoutTests/http/tests" -c TypesConfig "/home/clopez/webkit/webkit/LayoutTests/http/conf/mime.types" -c PHPINIDir "/home/clopez/webkit/webkit/LayoutTests/http/conf" -c CustomLog "/home/clopez/webkit/webkit/layout-test-results/access_log.txt" common -c ErrorLog "/home/clopez/webkit/webkit/layout-test-results/error_log.txt" -c PidFile /tmp/WebKit/httpd.pid -c Alias /js-test-resources "/home/clopez/webkit/webkit/LayoutTests/resources" -c Alias /media-resources "/home/clopez/webkit/webkit/LayoutTests/media" -c Alias /resources/testharness.css "/home/clopez/webkit/webkit/LayoutTests/resources/testharness.css" -c Alias /resources/testharness.js "/home/clopez/webkit/webkit/LayoutTests/resources/testharness.js" -c Alias /resources/testharnessreport.js "/home/clopez/webkit/webkit/LayoutTests/resources/testharnessreport.js" -C User "clopez" -C Listen 127.0.0.1:8000 -C Listen [::1]:8000 -C Listen 127.0.0.1:8080 -C Listen [::1]:8080 -C Listen 127.0.0.1:8443 -C Listen [::1]:8443 -c SSLCertificateFile /home/clopez/webkit/webkit/LayoutTests/http/conf/webkit-httpd.pem' [Mon Aug 29 15:48:49.582558 2016] [:error] [pid 27479] [client 127.0.0.1:37814] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-cross-origin.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-cross-origin.html [Mon Aug 29 15:48:56.592238 2016] [:error] [pid 27833] [client 127.0.0.1:37824] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-cookie.html [Mon Aug 29 15:49:03.492863 2016] [:error] [pid 27479] [client 127.0.0.1:33374] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-cross-origin-from-https.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: https://127.0.0.1:8443/navigation/ping-attribute/anchor-cross-origin-from-https.html [Mon Aug 29 15:49:10.398375 2016] [:error] [pid 27802] [client 127.0.0.1:37836] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-same-origin.html [Mon Aug 29 15:49:17.311933 2016] [:error] [pid 27833] [client 127.0.0.1:37840] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-cross-origin.html [Mon Aug 29 15:49:24.210298 2016] [:error] [pid 27834] [client 127.0.0.1:37844] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: http://127.0.0.1:8000/navigation/ping-attribute/area-cookie.html [Mon Aug 29 15:49:31.136838 2016] [:error] [pid 27802] [client 127.0.0.1:33392] script '/home/clopez/webkit/webkit/LayoutTests/http/tests/resources/delete-ping.php' not found or unable to stat, referer: https://127.0.0.1:8443/navigation/ping-attribute/area-cross-origin-from-https.html [Mon Aug 29 15:49:38.078856 2016] [:error] [pid 27833] [client 127.0.0.1:37854] PHP Warning: unlink(/tmp/-navigation-ping-attribute-anchor-same-origin.html.ping.txt): No such file or directory in /home/clopez/webkit/webkit/LayoutTests/http/tests/navigation/resources/delete-ping.php on line 4, referer: http://127.0.0.1:8000/navigation/ping-attribute/anchor-same-origin.html [Mon Aug 29 15:50:59.816980 2016] [mpm_prefork:notice] [pid 27477] AH00169: caught SIGTERM, shutting down