Api security vulnerabilities jobs

Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Tür
Beceri
Diller
    İş Durumu
    2,078 api security vulnerabilities iş bulundu, ücretlendirmeleri EUR

    Section 1: Final points to be verify and fix if any issues 1) SMTP to API for email via [login to view URL] api 2) Email and SMS notification alert for message from trade related 3) Validations in Register page 4) Multiple user session lock 5) Session Hijacking 6) Update mobile no otp verification 7)Sign In link expire on click for sign in 8) Ledger proper in

    €34 (Avg Bid)
    €34 Ortalama Teklif
    1 teklifler

    ...project, I would like to investigate the amount and severity of web security and in particular data vulnerabilities. This will be with a white-hat and I will report the findings to the website owners. For this project, I have a list of small-sized websites to be scanned for vulnerabilities. Note, any scan is not allowed to affect or degrade the performance

    €9 / hr (Avg Bid)
    €9 / hr Ortalama Teklif
    1 teklifler

    ...project, I would like to investigate the amount and severity of web security and in particular data vulnerabilities. This will be with a white-hat and I will report the findings to the website owners. For this project, I have a list of small-sized websites to be scanned for vulnerabilities. Note, any scan is not allowed to degrade the performance of the

    €9 / hr (Avg Bid)
    €9 / hr Ortalama Teklif
    1 teklifler

    ...project, I would like to investigate the amount and severity of web security and in particular data vulnerabilities. This will be with a white-hat and I will report the findings to the website owners. For this project, I have a list of small-sized websites to be scanned for vulnerabilities. Note, any scan is not allowed to affect or degrade the performance

    €13 / hr (Avg Bid)
    €13 / hr Ortalama Teklif
    1 teklifler

    ...top 10 mainly (Cross-site scripting and SQL Injection) vulnerabilities from PHP Web applications using pattern matching and OWASP's prevention rules for XSS and SQLI. So I have developed the tool, the tool can scan files from the vulnerabilities as mentioned earlier and prints vulnerabilities whether its XSS or SQLI with the line number that is acquired

    €160 (Avg Bid)
    €160 Ortalama Teklif
    12 teklifler

    Hi I have a laravel web application that I want to get tested for all types of security related vulnerabilities . Thanks

    €126 (Avg Bid)
    €126 Ortalama Teklif
    21 teklifler

    Scenario - You are an Information Security engineer for a midsized company. The company would like to offer direct sales of its “WigIT” app to its consumers on the World Wide Web. Your manager has asked you to prepare an informational paper for the Chief Executive Officer (CEO) on wireless and mobile risk management. What risks do you envision

    €44 (Avg Bid)
    €44 Ortalama Teklif
    11 teklifler

    Need so...with Nexpose/Rapid7 API. Need to be able to do at least the following from powershell: - Login/Authenticate into Nexpose/Rapid7. - List/Modify Sites (Add hosts to sites) - Initiate a scan of a site - Generate reports - Get list of vulnerabilities The API documentation can be found here: [login to view URL]

    €238 (Avg Bid)
    €238 Ortalama Teklif
    3 teklifler

    A lot of my websites are Wordpress based and seem to have quite a few frequent attacks. What I would like to resolve is having you trying to attack in to my website and for example, injecting some code into my Wordpress blog. For a test, I will provide a test site for you. If you manage, I would like to work with you on a lot more projects to help us enhance. Please let me know your experienc...

    €187 (Avg Bid)
    €187 Ortalama Teklif
    28 teklifler

    Hi, I've a big project that needs checking a function(10k-12k) lines of code and identify the vulnerabilities in the software. And also come up with solution to mitigate such risks. I will give detail to shortlisted candidates. Will hire 1 or 2 testers. Thanks!

    €20 / hr (Avg Bid)
    €20 / hr Ortalama Teklif
    14 teklifler
    C exploiting Bitti left

    I am looking for an expert in the c programming with an extensive knowledge of security, vulnerabilities of the language and how to exploit them.

    €25 / hr (Avg Bid)
    €25 / hr Ortalama Teklif
    7 teklifler

    ...metric between project version. for example, lets say I have a java Project 1. we can use a code quality scanning software and scan the project for metrics like LOC, vulnerabilities, complexity, maintainability, etc... now, lets say i modified a java file in the project by adding a new line or an if statement or a comment. clearly, the project is

    €84 (Avg Bid)
    €84 Ortalama Teklif
    6 teklifler

    Hi, I've some small projects that needs checking a function(10-12) lines of code and identify the vulnerabilities in the software. And also come up with solution to mitigate such risks. I will give detail to shortlisted candidates. Thanks!

    €22 / hr (Avg Bid)
    €22 / hr Ortalama Teklif
    9 teklifler

    Security Dashboard covering asset inventory and vulnerabilities

    €257 (Avg Bid)
    €257 Ortalama Teklif
    2 teklifler

    ...PDF specs available) Have experience working with WP / MySQL / PHP and be able to deliver a final product that includes protections of the known injections and other vulnerabilities. We have a webpage that users fill out a few forms. Data gets sent to database. Use a admin framework to allow us to see the data and update the data to flag it for different

    €159 (Avg Bid)
    €159 Ortalama Teklif
    56 teklifler

    Hi I want to create a vpn service. There is alot of scripts to do everything automatically ( paid - free ) as well as open source VPN management ...from my panel and add it as vpn . I need some one worked in this field before and i need very good programmer, please only one who can make SECURE CODING , no bugs, no vulnerabilities. More details in pm

    €456 (Avg Bid)
    €456 Ortalama Teklif
    14 teklifler

    An article of 6 pages for com...analysis for an e-commerce company. the following subsections will be covered regarding the ISO27001 SERIES. assets valuation and identification, threats identification, vulnerabilities, inherent risk assertion, control and residual risk determination. threat trees of assets are to be created. more info to be provided

    €47 (Avg Bid)
    €47 Ortalama Teklif
    15 teklifler

    ...need a website which has a homepage in which the user enters a URL of some other website. Then my website should scan the other website, i.e the entered URL for security vulnerabilities and generate a report for the same. namely heyi .. in how much can you provide a website that checks for these Website Fingerprinting version based vulnerability

    €110 (Avg Bid)
    €110 Ortalama Teklif
    4 teklifler

    I would like someo...purifier filters. I already have a storefront with a payment gateway, so you can use that for reference. Security is very important to me, so you'll need to make sure the security aspect is covered in website - common security vulnerabilities should be handled, customer data should be secured and not be available to hackers etc.

    €104 (Avg Bid)
    €104 Ortalama Teklif
    22 teklifler

    ...seems there are so many vulnerabilities associated with it. I would need someone to scan those vulnerabilities and apply recommended fixes to them. Basically, i have installed WAMP server and i have placed my project under www folder. So far i have made the website up and running locally. However, there are many vulnerabilities and i need help in fixing

    €161 (Avg Bid)
    €161 Ortalama Teklif
    21 teklifler

    hello how are you i have an word press it lunch in IIS SERVER I want you to fix all the work cuz it in local server the work will be online using team viewr i will attach the edit full edit i want it the edit in the file 9 edit

    €129 (Avg Bid)
    €129 Ortalama Teklif
    7 teklifler

    hello how are you i have an word press it lunch in IIS SERVER I want you to fix all the work cuz it in local server the work will be online using team viewr i will attach the edit full edit i want it the edit in the file 9 edit

    €18 (Avg Bid)
    €18 Ortalama Teklif
    2 teklifler

    explore and evaluate the vulnerabilities of wireless devices through researching existing literature articles, journals, white papers, and practical experiments with use of screenshots. once experiments complete explore mitigation techniques that can be employed.

    €139 (Avg Bid)
    €139 Ortalama Teklif
    12 teklifler

    ...exporting raw data and access governed by roles. Function Some examples of views that shall be available: Pie chart distributing vulnerabilities by severity, critical/high/medium Summary table of each host’s vulnerabilities with the CVSS base score. Most vulnerable hosts, list. One table pr vulnerability with affected hosts. All reports shall be

    €3 / hr (Avg Bid)
    €3 / hr Ortalama Teklif
    2 teklifler

    Hi Can you please check our server code files and server settings for vulnerabilities and fix them. Our server runs our Accounting/Inventory system ([login to view URL] [login to view URL] Based on a modified FrontAccounting ERP. And also a custom web app for our wholesale customers to check stock and order, as well as for staff to edit price list, view some

    €443 (Avg Bid)
    €443 Ortalama Teklif
    1 teklifler

    ...attacker to inject malicious scripts into your website. Normally this is possible via exploitable vulnerabilities in out-of-date software in your site's application such as plugins or themes which you have installed. It is also possible due to poor security practices in custom-written website code, or insecure passwords for your email, ftp or hosting accounts

    €140 (Avg Bid)
    €140 Ortalama Teklif
    26 teklifler

    ...exporting raw data and access governed by roles. Function Some examples of views that shall be available: Pie chart distributing vulnerabilities by severity, critical/high/medium Summary table of each host’s vulnerabilities with the CVSS base score. Most vulnerable hosts, list. One table pr vulnerability with affected hosts. All reports shall be

    €4 / hr (Avg Bid)
    €4 / hr Ortalama Teklif
    5 teklifler
    Sonarqube php Bitti left

    1. 1. Evaluate the Sonarqube report and then correct all vulnerabilities of the codes 2. Suggest new or better ways to the code logic wherever possible

    PHP
    €89 (Avg Bid)
    €89 Ortalama Teklif
    12 teklifler

    I need a website that takes a URL as an input and then checks the other site for security vulnerabilities. And gives the output as a result which contains all the flaws the input URL site has and possible ways to improve it. It would be preferred if the built site could later be integrated into an android app. The site which you have to build needs

    €178 (Avg Bid)
    €178 Ortalama Teklif
    12 teklifler

    We are updating our custom software. 90% is perl in cgi,...custom software. 90% is perl in cgi, 10% php support scripts. Updates will be to update our encryption we use for users information, checking current software for known vulnerabilities, and making some custom changes. Will be looking for more work as time goes on (Read: could be longer term)

    €2180 (Avg Bid)
    €2180 Ortalama Teklif
    31 teklifler

    build a website in which the website should be able to find all the list of the vulnerabilities present in the website entered in the search box using vulnerabilities searching tools ..

    €90 (Avg Bid)
    €90 Ortalama Teklif
    2 teklifler
    Program C/C++ Bitti left

    Need a program in C / C ++ for pentest of a virtual machine in Linux environment. I need a specialist in vulnerabilities. The budget is 50 dollars.

    €77 (Avg Bid)
    €77 Ortalama Teklif
    9 teklifler

    ...to enter the domain and make a full pentest. We need the system to check agains all vulnerabilities. The system must have a easy to use UI and should give us a full reports as a PDF file. Please tell us in which framwork you would set it up and whicht vulnerabilities would be tested. You can use Source from Guthub etc. - but we need a nice Graphical

    €1154 (Avg Bid)
    €1154 Ortalama Teklif
    18 teklifler
    Programm C/C++ Bitti left

    Need a program in C / C ++ for pentest of a virtual machine in Linux environment. I need a specialist in vulnerabilities. The budget is 50 dollars.

    €89 (Avg Bid)
    €89 Ortalama Teklif
    7 teklifler

    ..."some pages on this site may have been hacked by a third party or display spammy content or links, you should take immediate action to clean your site and fix any security vulnerabilities" pages affected [login to view URL] [login to view URL] [login to view URL] We need 1 - both sites cleaned 2 - any wordpress addins

    €222 (Avg Bid)
    €222 Ortalama Teklif
    33 teklifler

    Objectives 1. Analyse the given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following

    €89 (Avg Bid)
    €89 Ortalama Teklif
    17 teklifler

    ...operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test results of the remediation strategy. • Finally, you are

    €98 (Avg Bid)
    €98 Ortalama Teklif
    3 teklifler

    ...have some PEN tests carried out on. This is a web only system and we need software testing not server security. We want to arrange an independent test to see if the web software system security is good, bad, or ugly and find weaknesses and vulnerabilities. We can give login name and passwords so that tests can be carried out while logged in and also not

    €377 (Avg Bid)
    €377 Ortalama Teklif
    7 teklifler

    Required: .Net, SQL, C#, Web Security, SQL Injection, XSS etc, Proficiency in English in an academic level. Two basic websites need to be tested and compared in terms of security vulnerabilities. And a short report required for findings. . Project: Source files and DB .bak file and testing guidance document will be provided (needed: Visual Studio

    €4 / hr (Avg Bid)
    €4 / hr Ortalama Teklif
    10 teklifler

    I need a website that takes a URL as an input and then checks the other site for security vulnerabilities. And gives the output as a result which contains all the flaws the input URL site has and possible ways to improve it. It would be preferred if the built site could later be integrated into an android app.

    €127 (Avg Bid)
    €127 Ortalama Teklif
    3 teklifler
    solve a script Bitti left

    i have a script which scans a docker image frequently for vulnerabilities , it runs fine for first time scans and stores output, but it fails to pic the next image to scan

    €25 (Avg Bid)
    €25 Ortalama Teklif
    5 teklifler

    Objectives 1. Analyse the given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system

    €137 (Avg Bid)
    €137 Ortalama Teklif
    10 teklifler

    I would like someone expert to web safety and security to check a web application. Web application is developed in html, css, jquery, php, mysql. I would like him to check for all possible vulnerabilities and provide constructive feedback and basic repair instructions. The web app is really simple with just an authentication and a form consisting of

    €29 (Avg Bid)
    €29 Ortalama Teklif
    20 teklifler

    ...methodology. 2. Details of the vulnerabilities you have discovered. Screenshot. 3. Descriptions of the exploits you used to exploit the discovered vulnerabilities. 4. Details of unsuccessful tests. 5. The process and techniques you used, including the tools and commands used. 6. Possible mitigations for each of the vulnerabilities. Your submitted document

    €98 (Avg Bid)
    €98 Ortalama Teklif
    14 teklifler

    ...operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test results of the remediation strategy. • Finally, you are

    €51 (Avg Bid)
    €51 Ortalama Teklif
    3 teklifler

    ...encrypt a partition or the entire storage device with pre-boot authentication. PLEASE NOTE: Accepted reports must follow VeraCrypt's Security Model (see attached PDF) • QUALIFICATION • Only CRITICAL vulnerabilities that demonstrate complete compromise of the system's integrity or confidentiality are eligible for payment - typically Arbitrary Code

    €221 - €664
    €221 - €664
    0 teklifler

    ...designed for a mainframe security plan 3.9.1 Understanding and Approach to Provide UNISYS Mainframe Compliance - Serve as a Mainframe UNISYS technical specialist to support cybersecurity and IT services. • Assess, audit, review, analyze, validate, and report Mainframe SRG and STIG vulnerabilities, and ensure security controls are implemented

    €35 / hr (Avg Bid)
    €35 / hr Ortalama Teklif
    12 teklifler

    ...operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test results of the remediation strategy. • Finally, you are

    €129 (Avg Bid)
    €129 Ortalama Teklif
    4 teklifler

    Need a program in C / C ++ for pentest of a virtual machine in Linux environment. The description of vulnerabilities is, the program’s sketches are available.

    €174 (Avg Bid)
    €174 Ortalama Teklif
    7 teklifler

    ...funding through Ethereum, Our solution shall support investments with multiple currencies. SECURITY We follow the industry standard best practices to develop flawless and fully secure web application.. Our codes are free from all OWASP reported vulnerabilities SMART CONTRACT RECOMMENDATIONS Pausing- Zeppelin process lifecycle management as damage control

    €5129 (Avg Bid)
    €5129 Ortalama Teklif
    25 teklifler