Cross Site Scripting Bug

Imekamilika Ilichapishwa Jun 10, 2009 Kulipwa wakati wa kujifungua
Imekamilika Kulipwa wakati wa kujifungua

We are looking for someone to correct a cross site scripting bug. See the PCI Scan below. The url of the file is listed.

| TCP | | http/https | **4** | Possible cross site scripting on [[url removed, login to view] [url removed, login to view]][1] Use the following commands to verify this: wp --inject "[[url removed, login to view] [url removed, login to view] pt%3Ealert%28123%29%3C%2Fscript%3E&work_ex tn="][2] POST curl -L -k -d "checkbox1=Y%22%3E%3Cscript%3Ealert%28123 %29%3C%2Fscript%3E&work_extn=" "[[url removed, login to view] [url removed, login to view]"|][3] grep "123" This website may have other injection related vulnerabilities. |

We will provide you with the file mentioned in the URL, and we will upload it to our servers and run a PCI scan once it has been completed for the release of the payment.

If you have any questions let me know.

Ali

Uhandisi MySQL PHP Software Architecture Majaribio ya Software Mwenyeji wa Mtandao Usimamizi wa Tovuti Kujaribu Tovuti

Kitambulisho cha Mradi: #3933353

Kuhusu mradi

4 mapendekezo Mradi wa mbali Ipo mtandaoni %project.latestActivity_relativeTime|badilisha%

Imetuzwa kwa:

hexasoft

See private message.

$9 USD kwa siku 14
(Maoni 10)
2.6

4 wafanyakazi huru wanazabuni wastani wa $45 kwa kazi hii

witscomputing

See private message.

$42.5 USD kwa siku 14
(Maoni 400)
6.8
netbee

See private message.

$85 USD kwa siku 14
(Maoni 127)
6.1
lehacf

See private message.

$42.5 USD kwa siku 14
(Maoni 12)
3.8