Cross Site Scripting Bug

Completato Pubblicato Jun 10, 2009 Pagato alla consegna
Completato Pagato alla consegna

We are looking for someone to correct a cross site scripting bug. See the PCI Scan below. The url of the file is listed.

| TCP | | http/https | **4** | Possible cross site scripting on [[url removed, login to view] [url removed, login to view]][1] Use the following commands to verify this: wp --inject "[[url removed, login to view] [url removed, login to view] pt%3Ealert%28123%29%3C%2Fscript%3E&work_ex tn="][2] POST curl -L -k -d "checkbox1=Y%22%3E%3Cscript%3Ealert%28123 %29%3C%2Fscript%3E&work_extn=" "[[url removed, login to view] [url removed, login to view]"|][3] grep "123" This website may have other injection related vulnerabilities. |

We will provide you with the file mentioned in the URL, and we will upload it to our servers and run a PCI scan once it has been completed for the release of the payment.

If you have any questions let me know.

Ali

Ingegneria MySQL PHP Architettura Software Testare Software Web Hosting Gestione Siti Web Collaudo Siti Web

Rif. progetto: #3933353

Info sul progetto

4 proposte Progetto a distanza Attivo Jun 11, 2009

Assegnato a:

hexasoft

See private message.

$9 USD in 14 giorni
(10 valutazioni)
2.6

4 freelance hanno fatto un'offerta media di $45 per questo lavoro

witscomputing

See private message.

$42.5 USD in 14 giorni
(400 valutazioni)
6.8
netbee

See private message.

$85 USD in 14 giorni
(127 valutazioni)
6.1
lehacf

See private message.

$42.5 USD in 14 giorni
(12 valutazioni)
3.8