<?xml version="1.0"?>
<OWASPZAPReport programName="ZAP" version="2.17.0" generated="Sat, 11 Apr 2026 16:45:51" created="2026-04-11T14:45:51.225058800Z">
	
		<site name="http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do" host="127.0.0.1" port="8080" ssl="false">
			<alerts>
				
					<alertitem>
						<pluginid>10031</pluginid>
						<alertRef>10031</alertRef>
						<alert>User Controllable HTML Element Attribute (Potential XSS)</alert>
						<name>User Controllable HTML Element Attribute (Potential XSS)</name>
						<riskcode>0</riskcode>
						<confidence>1</confidence>
						<riskdesc>Informational (Low)</riskdesc>
						<confidencedesc>Low</confidencedesc>
						<desc>&lt;p&gt;This check looks at user-supplied input in query string parameters and POST data to identify where certain HTML attribute values might be controlled. This provides hot-spot detection for XSS (cross-site scripting) that will require further review by a security analyst to determine exploitability.&lt;/p&gt;</desc>
						<instances>
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTCacheAlgoritmo</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTCacheAlgoritmo=LRU

The user-controlled value was:
lru</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTCacheDimensione</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTCacheDimensione=10000

The user-controlled value was:
10000</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTCacheLifeTime</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTCacheLifeTime=300

The user-controlled value was:
300</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTCacheStato</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTCacheStato=disabilitato

The user-controlled value was:
disabilitato</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTFirstTime</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTFirstTime=false

The user-controlled value was:
false</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>ctHttpMode</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
ctHttpMode=default

The user-controlled value was:
default</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTNumMaxReqStato</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
CTNumMaxReqStato=abilitato

The user-controlled value was:
abilitato</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTNumMaxReqTipoErrore</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTNumMaxReqTipoErrore=http429

The user-controlled value was:
http429</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTNumMaxReqTipoErroreDescr</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTNumMaxReqTipoErroreDescr=true

The user-controlled value was:
true</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTpercentualeCongestioneThreshold</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
CTpercentualeCongestioneThreshold=55

The user-controlled value was:
55</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTRateLimitTipoErrore</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTRateLimitTipoErrore=http429

The user-controlled value was:
http429</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTRateLimitTipoErroreDescr</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTRateLimitTipoErroreDescr=true

The user-controlled value was:
true</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>CTStatoControlloCongestione</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
CTStatoControlloCongestione=abilitato

The user-controlled value was:
abilitato</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>ctSyncMode</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
ctSyncMode=default

The user-controlled value was:
default</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTConnectionTimeoutErogazione,CTConnectionTimeoutFruizione,CTFirstTime,CTNumMaxReqSoglia,CTNumMaxReqStato,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,CTReadTimeoutErogazione,CTReadTimeoutFruizione,CTStatoControlloCongestione,CTTempoMedioRispostaErogazione,CTTempoMedioRispostaFruizione,CTpercentualeCongestioneThreshold,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpMode,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl,ctSyncMode,edit-mode)</nodeName>
									<method>POST</method>
									<param>edit-mode</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
edit-mode=end

The user-controlled value was:
end</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>ConfigurazioneFirstTime</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
ConfigurazioneFirstTime=false

The user-controlled value was:
false</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTCacheAlgoritmo</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTCacheAlgoritmo=LRU

The user-controlled value was:
lru</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTCacheDimensione</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTCacheDimensione=10000

The user-controlled value was:
10000</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTCacheLifeTime</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTCacheLifeTime=300

The user-controlled value was:
300</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTCacheStato</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
CTCacheStato=disabilitato

The user-controlled value was:
disabilitato</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTFirstTime</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTFirstTime=false

The user-controlled value was:
false</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTNumMaxReqTipoErrore</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTNumMaxReqTipoErrore=http429

The user-controlled value was:
http429</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTNumMaxReqTipoErroreDescr</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTNumMaxReqTipoErroreDescr=true

The user-controlled value was:
true</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTRateLimitTipoErrore</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTRateLimitTipoErrore=http429

The user-controlled value was:
http429</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do ()(CTCacheAlgoritmo,CTCacheDimensione,CTCacheIdleTime,CTCacheLifeTime,CTCacheStato,CTFirstTime,CTNumMaxReqTipoErrore,CTNumMaxReqTipoErroreDescr,CTRateLimitTipoErrore,CTRateLimitTipoErroreDescr,ConfigurazioneFirstTime,__i_hidden_locklabel_,__i_hidden_lockurl_,__i_hidden_lockvalue_,_csrf,ctCount,ctEngineType,ctHttpQuota,ctHttpRemaining,ctHttpReset,ctHttpRetryAfter,ctHttpRetryAfterBackoff,ctImpl)</nodeName>
									<method>POST</method>
									<param>CTRateLimitTipoErroreDescr</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
CTRateLimitTipoErroreDescr=true

The user-controlled value was:
true</otherinfo>
								</instance>
							
						</instances>
						<count>25</count>
						<systemic>false</systemic>
						<solution>&lt;p&gt;Validate all input and sanitize output it before writing to any HTML attributes.&lt;/p&gt;</solution>
						<otherinfo>&lt;p&gt;User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;http://127.0.0.1:8080/govwayConsole/configurazioneControlloTraffico.do&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;appears to include user input in:&lt;/p&gt;&lt;p&gt;a(n) [input] tag [value] attribute&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The user input found was:&lt;/p&gt;&lt;p&gt;CTCacheAlgoritmo=LRU&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The user-controlled value was:&lt;/p&gt;&lt;p&gt;lru&lt;/p&gt;</otherinfo>
						<reference>&lt;p&gt;https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html&lt;/p&gt;</reference>
						<cweid>20</cweid>
						<wascid>20</wascid>
						<sourceid>219</sourceid>
					</alertitem>
				
			</alerts>
		</site>
	
	
		<insights>
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site></site>
					<key>insight.network.failure</key>
					<description>Percentage of network failures</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>56</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.code.3xx</key>
					<description>Percentage of responses with status code 3xx</description>
					<statistic>9</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Exceeded Low</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.code.4xx</key>
					<description>Percentage of responses with status code 4xx</description>
					<statistic>32</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.code.5xx</key>
					<description>Percentage of responses with status code 5xx</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.image/gif</key>
					<description>Percentage of endpoints with content type image/gif</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.image/png</key>
					<description>Percentage of endpoints with content type image/png</description>
					<statistic>4</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.image/x-icon</key>
					<description>Percentage of endpoints with content type image/x-icon</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.text/css</key>
					<description>Percentage of endpoints with content type text/css</description>
					<statistic>6</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.text/html</key>
					<description>Percentage of endpoints with content type text/html</description>
					<statistic>72</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.text/javascript</key>
					<description>Percentage of endpoints with content type text/javascript</description>
					<statistic>6</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.method.GET</key>
					<description>Percentage of endpoints with method GET</description>
					<statistic>66</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.method.POST</key>
					<description>Percentage of endpoints with method POST</description>
					<statistic>33</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.total</key>
					<description>Count of total endpoints</description>
					<statistic>195</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Exceeded Low</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.response.slow</key>
					<description>Percentage of slow responses</description>
					<statistic>14</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://consent.cookiebot.com</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://consent.cookiebot.com</site>
					<key>insight.response.slow</key>
					<description>Percentage of slow responses</description>
					<statistic>23</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://consentcdn.cookiebot.com</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://fonts.googleapis.com</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://js-eu1.hs-scripts.com</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://link.it</site>
					<key>insight.code.3xx</key>
					<description>Percentage of responses with status code 3xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://pagead2.googlesyndication.com</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://region1.google-analytics.com</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://www.googletagmanager.com</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://www.googletagmanager.com</site>
					<key>insight.response.slow</key>
					<description>Percentage of slow responses</description>
					<statistic>25</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://www.link.it</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>100</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>https://www.link.it</site>
					<key>insight.response.slow</key>
					<description>Percentage of slow responses</description>
					<statistic>5</statistic>
				</insight>
			
		</insights>
	
</OWASPZAPReport>