Cross Site Scripting Bug

已完成 已发布的 Jun 10, 2009 货到付款
已完成 货到付款

We are looking for someone to correct a cross site scripting bug. See the PCI Scan below. The url of the file is listed.

| TCP | | http/https | **4** | Possible cross site scripting on [[url removed, login to view] [url removed, login to view]][1] Use the following commands to verify this: wp --inject "[[url removed, login to view] [url removed, login to view] pt%3Ealert%28123%29%3C%2Fscript%3E&work_ex tn="][2] POST curl -L -k -d "checkbox1=Y%22%3E%3Cscript%3Ealert%28123 %29%3C%2Fscript%3E&work_extn=" "[[url removed, login to view] [url removed, login to view]"|][3] grep "123" This website may have other injection related vulnerabilities. |

We will provide you with the file mentioned in the URL, and we will upload it to our servers and run a PCI scan once it has been completed for the release of the payment.

If you have any questions let me know.

Ali

工程 MySQL PHP 软件构架 软件测试 网络主机 网站管理 网站测试

项目ID: #3933353

关于项目

4个方案 远程项目 活跃的Jun 11, 2009

授予:

hexasoft

See private message.

$9 USD 在14天内
(10条评论)
2.6

有4名威客正在参与此工作的竞标,均价$45/小时

witscomputing

See private message.

$42.5 USD 在14天内
(400条评论)
6.8
netbee

See private message.

$85 USD 在14天内
(127条评论)
6.1
lehacf

See private message.

$42.5 USD 在14天内
(12条评论)
3.8