![]() |
|
Home | Register | FAQ | Members List | Calendar | Search | Today's Posts | Mark Forums Read |
|
Thread Tools | Search this Thread | Display Modes |
#1
|
|||
|
|||
![]() Health.humongousmall.com
I have Sitelock on Humongousmall.com. I received the following vulnerability warning on one of the sub domains: URL:http://health.humongousmall.com/store/search/?=Find it!&price=1&tags=1&word=1 Cross site scripting vulnerability found in args:,price,tags,word URL:http://health.humongousmall.com/store/search/?=Find it!&brand=1&price=1&tags=1&word=1 Cross site scripting vulnerability found in args:,brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args:,brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args:,brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args:,brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args:,brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args:brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args:brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args:brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args:brand,price,tags,word URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args ![]() URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args ![]() URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args ![]() URL:http://health.humongousmall.com/stor...&tags=1&word=1 Cross site scripting vulnerability found in args ![]() How do fix this? |
#2
|
||||
|
||||
![]() Hi
You should ask Sitelock how to go about fixing those. They are the ones that will know why those URLs are triggering XSS vulnerability messages. Eric
__________________
![]() ![]() ![]() ![]() |
#3
|
|||
|
|||
![]() Is the datafeeedr plugin protected against CSRF, malware injection,
especially the Search bars? |
#4
|
||||
|
||||
![]() Yes.
__________________
![]() ![]() ![]() ![]() |
Thread Tools | Search this Thread |
Display Modes | |
|
|