<?xml version="1.0"?>
<OWASPZAPReport programName="ZAP" version="2.17.0" generated="Sat, 11 Apr 2026 17:16:43" created="2026-04-11T15:16:43.784953469Z">
	
		<site name="http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do" host="127.0.0.1" port="8080" ssl="false">
			<alerts>
				
					<alertitem>
						<pluginid>10031</pluginid>
						<alertRef>10031</alertRef>
						<alert>User Controllable HTML Element Attribute (Potential XSS)</alert>
						<name>User Controllable HTML Element Attribute (Potential XSS)</name>
						<riskcode>0</riskcode>
						<confidence>1</confidence>
						<riskdesc>Informational (Low)</riskdesc>
						<confidencedesc>Low</confidencedesc>
						<desc>&lt;p&gt;This check looks at user-supplied input in query string parameters and POST data to identify where certain HTML attribute values might be controlled. This provides hot-spot detection for XSS (cross-site scripting) that will require further review by a security analyst to determine exploitability.&lt;/p&gt;</desc>
						<instances>
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>__fake__search__</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [td] tag [id] attribute

The user input found was:
__fake__search__=search

The user-controlled value was:
searchformheader</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_0</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_0=filtroProtocollo

The user-controlled value was:
filtroprotocollo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_1</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_1=filtroTipoSA

The user-controlled value was:
filtrotiposa</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_2</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_2=filtroTipoCredenziali

The user-controlled value was:
filtrotipocredenziali</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_3</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_3=filtroRuolo

The user-controlled value was:
filtroruolo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_4</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_4=filtroGruppo

The user-controlled value was:
filtrogruppo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_5</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_5=filtroApiContesto

The user-controlled value was:
filtroapicontesto</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_6</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_6=subtDatiProp

The user-controlled value was:
subtdatiprop</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_7</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_7=filtroPropNome

The user-controlled value was:
filtropropnome</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_8</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_8=filtroPropValore

The user-controlled value was:
filtropropvalore</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterValue_3</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
filterValue_3=ModIRuolo1FonteQualsiasi

The user-controlled value was:
modiruolo1fontequalsiasi</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterValue_7</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
filterValue_7=authzContenutiTest

The user-controlled value was:
authzcontenutitest</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterValue_8</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterValue_8=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_2,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_2,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_2,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_2,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_2,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_2,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_2,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_2,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_2,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_2,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_2,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_2,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_2,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_2,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_2,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_2,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_2,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_2,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>search</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
search=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>__fake__search__</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [td] tag [id] attribute

The user input found was:
__fake__search__=search

The user-controlled value was:
searchformheader</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_0</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_0=filtroProtocollo

The user-controlled value was:
filtroprotocollo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_1</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_1=filtroTipoSA

The user-controlled value was:
filtrotiposa</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_2</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_2=filtroTipoCredenziali

The user-controlled value was:
filtrotipocredenziali</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_3</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_3=filtroRuolo

The user-controlled value was:
filtroruolo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_4</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_4=filtroGruppo

The user-controlled value was:
filtrogruppo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_5</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_5=filtroApiContesto

The user-controlled value was:
filtroapicontesto</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_6</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_6=subtDatiProp

The user-controlled value was:
subtdatiprop</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_7</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_7=filtroPropNome

The user-controlled value was:
filtropropnome</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_8</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_8=filtroPropValore

The user-controlled value was:
filtropropvalore</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterValue_3</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
filterValue_3=ModIRuolo1FonteQualsiasi

The user-controlled value was:
modiruolo1fontequalsiasi</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterValue_7</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
filterValue_7=authzContenutiTest

The user-controlled value was:
authzcontenutitest</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterValue_8</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterValue_8=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do ()(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>search</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
search=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>__fake__search__</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [td] tag [id] attribute

The user input found was:
__fake__search__=search

The user-controlled value was:
searchformheader</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_0</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_0=filtroProtocollo

The user-controlled value was:
filtroprotocollo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_1</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_1=filtroTipoSA

The user-controlled value was:
filtrotiposa</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_10</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_10=subtDatiProp

The user-controlled value was:
subtdatiprop</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_11</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_11=filtroPropNome

The user-controlled value was:
filtropropnome</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_12</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_12=filtroPropValore

The user-controlled value was:
filtropropvalore</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_2</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_2=filtroTipoCredenziali

The user-controlled value was:
filtrotipocredenziali</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_3</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_3=filtroRuolo

The user-controlled value was:
filtroruolo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_4</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_4=filtroGruppo

The user-controlled value was:
filtrogruppo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterName_5</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_5=filtroApiContesto

The user-controlled value was:
filtroapicontesto</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterValue_11</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
filterValue_11=authzContenutiTest

The user-controlled value was:
authzcontenutitest</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterValue_12</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterValue_12=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterValue_3</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
filterValue_3=ModIRuolo1FonteQualsiasi

The user-controlled value was:
modiruolo1fontequalsiasi</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>filterValue_9</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterValue_9=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,__i_hidden_title_iconUso_0_0,__i_hidden_title_iconUso_0_2,__i_hidden_title_iconUso_10_0,__i_hidden_title_iconUso_10_3,__i_hidden_title_iconUso_11_0,__i_hidden_title_iconUso_11_3,__i_hidden_title_iconUso_12_0,__i_hidden_title_iconUso_12_3,__i_hidden_title_iconUso_13_0,__i_hidden_title_iconUso_13_3,__i_hidden_title_iconUso_14_0,__i_hidden_title_iconUso_14_3,__i_hidden_title_iconUso_15_0,__i_hidden_title_iconUso_15_2,__i_hidden_title_iconUso_16_0,__i_hidden_title_iconUso_16_3,__i_hidden_title_iconUso_17_0,__i_hidden_title_iconUso_17_3,__i_hidden_title_iconUso_18_0,__i_hidden_title_iconUso_18_3,__i_hidden_title_iconUso_19_0,__i_hidden_title_iconUso_19_3,__i_hidden_title_iconUso_1_0,__i_hidden_title_iconUso_1_3,__i_hidden_title_iconUso_2_0,__i_hidden_title_iconUso_2_3,__i_hidden_title_iconUso_3_0,__i_hidden_title_iconUso_3_3,__i_hidden_title_iconUso_4_0,__i_hidden_title_iconUso_4_3,__i_hidden_title_iconUso_5_0,__i_hidden_title_iconUso_5_3,__i_hidden_title_iconUso_6_0,__i_hidden_title_iconUso_6_3,__i_hidden_title_iconUso_7_0,__i_hidden_title_iconUso_7_3,__i_hidden_title_iconUso_8_0,__i_hidden_title_iconUso_8_3,__i_hidden_title_iconUso_9_0,__i_hidden_title_iconUso_9_3,_csrf,be_name_0,chkAll,filterName_0,filterName_1,filterName_10,filterName_11,filterName_12,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterName_9,filterValue_11,filterValue_12,filterValue_3,filterValue_8,filterValue_9,limit,search,selectcheckbox,url_entry_0,url_entry_1,url_entry_10,url_entry_11,url_entry_12,url_entry_13,url_entry_14,url_entry_15,url_entry_16,url_entry_17,url_entry_18,url_entry_19,url_entry_2,url_entry_3,url_entry_4,url_entry_5,url_entry_6,url_entry_7,url_entry_8,url_entry_9)</nodeName>
									<method>POST</method>
									<param>search</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
search=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>__fake__search__</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [td] tag [id] attribute

The user input found was:
__fake__search__=search

The user-controlled value was:
searchformheader</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_0</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_0=filtroProtocollo

The user-controlled value was:
filtroprotocollo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_1</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_1=filtroTipoSA

The user-controlled value was:
filtrotiposa</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_2</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_2=filtroTipoCredenziali

The user-controlled value was:
filtrotipocredenziali</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_3</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_3=filtroRuolo

The user-controlled value was:
filtroruolo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_4</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_4=filtroGruppo

The user-controlled value was:
filtrogruppo</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_5</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_5=filtroApiContesto

The user-controlled value was:
filtroapicontesto</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_6</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_6=subtDatiProp

The user-controlled value was:
subtdatiprop</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_7</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_7=filtroPropNome

The user-controlled value was:
filtropropnome</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterName_8</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterName_8=filtroPropValore

The user-controlled value was:
filtropropvalore</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterValue_3</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
filterValue_3=ModIRuolo1FonteQualsiasi

The user-controlled value was:
modiruolo1fontequalsiasi</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterValue_7</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [option] tag [value] attribute

The user input found was:
filterValue_7=authzContenutiTest

The user-controlled value was:
authzcontenutitest</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>filterValue_8</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
filterValue_8=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
							
								<instance>
									<uri>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes</uri>
									<nodeName>http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do (__prevTabKey__,resetSearch)(__fake__search__,_csrf,filterName_0,filterName_1,filterName_2,filterName_3,filterName_4,filterName_5,filterName_6,filterName_7,filterName_8,filterValue_3,filterValue_7,filterValue_8,search)</nodeName>
									<method>POST</method>
									<param>search</param>
									<attack></attack>
									<evidence></evidence>
									<otherinfo>User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:

http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do?__prevTabKey__=8fea4ae0-e038-4206-bbb8-d5a8d232f54b&amp;resetSearch=yes

appears to include user input in:
a(n) [input] tag [value] attribute

The user input found was:
search=ZAP

The user-controlled value was:
zap</otherinfo>
								</instance>
							
						</instances>
						<count>57</count>
						<systemic>false</systemic>
						<solution>&lt;p&gt;Validate all input and sanitize output it before writing to any HTML attributes.&lt;/p&gt;</solution>
						<otherinfo>&lt;p&gt;User-controlled HTML attribute values were found. Try injecting special characters to see if XSS might be possible. The page at the following URL:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;http://127.0.0.1:8080/govwayConsole/serviziApplicativiList.do&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;appears to include user input in:&lt;/p&gt;&lt;p&gt;a(n) [td] tag [id] attribute&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The user input found was:&lt;/p&gt;&lt;p&gt;__fake__search__=search&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The user-controlled value was:&lt;/p&gt;&lt;p&gt;searchformheader&lt;/p&gt;</otherinfo>
						<reference>&lt;p&gt;https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html&lt;/p&gt;</reference>
						<cweid>20</cweid>
						<wascid>20</wascid>
						<sourceid>1271</sourceid>
					</alertitem>
				
			</alerts>
		</site>
	
	
		<insights>
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site></site>
					<key>insight.network.failure</key>
					<description>Percentage of network failures</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.code.2xx</key>
					<description>Percentage of responses with status code 2xx</description>
					<statistic>66</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.code.3xx</key>
					<description>Percentage of responses with status code 3xx</description>
					<statistic>12</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.code.4xx</key>
					<description>Percentage of responses with status code 4xx</description>
					<statistic>18</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.code.5xx</key>
					<description>Percentage of responses with status code 5xx</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.image/gif</key>
					<description>Percentage of endpoints with content type image/gif</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.image/png</key>
					<description>Percentage of endpoints with content type image/png</description>
					<statistic>3</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.image/x-icon</key>
					<description>Percentage of endpoints with content type image/x-icon</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.text/css</key>
					<description>Percentage of endpoints with content type text/css</description>
					<statistic>6</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.text/html</key>
					<description>Percentage of endpoints with content type text/html</description>
					<statistic>73</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.text/javascript</key>
					<description>Percentage of endpoints with content type text/javascript</description>
					<statistic>6</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.ctype.text/plain</key>
					<description>Percentage of endpoints with content type text/plain</description>
					<statistic>1</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.method.GET</key>
					<description>Percentage of endpoints with method GET</description>
					<statistic>64</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.method.POST</key>
					<description>Percentage of endpoints with method POST</description>
					<statistic>35</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.endpoint.total</key>
					<description>Count of total endpoints</description>
					<statistic>203</statistic>
				</insight>
			
			
				<insight>
					<level>Info</level>
					<reason>Informational</reason>
					<site>http://127.0.0.1:8080</site>
					<key>insight.response.slow</key>
					<description>Percentage of slow responses</description>
					<statistic>25</statistic>
				</insight>
			
		</insights>
	
</OWASPZAPReport>