Security Hero Rotating Header Image

Cross-site Scripting vulnerability in Stronghold/2.3 Apache/1.2.6 C2NetUS/2007

Cross-site Scripting vulnerability in Stronghold/2.3 Apache/1.2.6 C2NetUS/2007

<!– Envelope-to: email@address Delivery-date: Mon, 20 Apr 2009 17:49:59 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1Lvwgx-0007kq-CE for email@address; Mon, 20 Apr 2009 17:49:59 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id D4ED4237043; Mon, 20 Apr 2009 10:25:55 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 26422 invoked from network); 18 Apr 2009 10:20:15 -0000 Message-ID: <20090418102432.10605.qmail@securityfocus.com> Content-Type: text/plain Content-Disposition: inline MIME-Version: 1.0 X-Mailer: MIME-tools 5.411 (Entity 5.404) C2NetUS/2007 Content-Transfer-Encoding: quoted-printable Status: O X-UID: 8836 Content-Length: 4299 X-Keywords:

Leave a Reply

Your email address will not be published. Required fields are marked *