Cross Site Scripting Bug

Completado Publicado Jun 10, 2009 Pagado a la entrega
Completado Pagado a la entrega

We are looking for someone to correct a cross site scripting bug. See the PCI Scan below. The url of the file is listed.

| TCP | | http/https | **4** | Possible cross site scripting on [[url removed, login to view] [url removed, login to view]][1] Use the following commands to verify this: wp --inject "[[url removed, login to view] [url removed, login to view] pt%3Ealert%28123%29%3C%2Fscript%3E&work_ex tn="][2] POST curl -L -k -d "checkbox1=Y%22%3E%3Cscript%3Ealert%28123 %29%3C%2Fscript%3E&work_extn=" "[[url removed, login to view] [url removed, login to view]"|][3] grep "123" This website may have other injection related vulnerabilities. |

We will provide you with the file mentioned in the URL, and we will upload it to our servers and run a PCI scan once it has been completed for the release of the payment.

If you have any questions let me know.

Ali

Ingeniería MySQL PHP Arquitectura de software Verificación de software Web Hosting Gestión de páginas web Verificación de páginas web

Nº del proyecto: #3933353

Sobre el proyecto

4 propuestas Proyecto remoto Activo Jun 11, 2009

Adjudicado a:

hexasoft

See private message.

$9 USD en 14 días
(10 comentarios)
2.6

4 freelancers están ofertando un promedio de $45 por este trabajo

witscomputing

See private message.

$42.5 USD en 14 días
(400 comentarios)
6.8
netbee

See private message.

$85 USD en 14 días
(127 comentarios)
6.1
lehacf

See private message.

$42.5 USD en 14 días
(12 comentarios)
3.8