Java code security vulnerabilities jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,064 java code security vulnerabilities jobs found, pricing in NZD

    Hi I want to create a vpn service. There is alot of scripts to do everything automatically ( paid - free ) as well as open source VPN management ...from my panel and add it as vpn . I need some one worked in this field before and i need very good programmer, please only one who can make SECURE CODING , no bugs, no vulnerabilities. More details in pm

    $755 (Avg Bid)
    $755 Avg Bid
    14 bids

    An article of 6 pages for com...analysis for an e-commerce company. the following subsections will be covered regarding the ISO27001 SERIES. assets valuation and identification, threats identification, vulnerabilities, inherent risk assertion, control and residual risk determination. threat trees of assets are to be created. more info to be provided

    $78 (Avg Bid)
    $78 Avg Bid
    15 bids

    ...need a website which has a homepage in which the user enters a URL of some other website. Then my website should scan the other website, i.e the entered URL for security vulnerabilities and generate a report for the same. namely heyi .. in how much can you provide a website that checks for these Website Fingerprinting version based vulnerability

    $182 (Avg Bid)
    $182 Avg Bid
    4 bids

    I would like someo...purifier filters. I already have a storefront with a payment gateway, so you can use that for reference. Security is very important to me, so you'll need to make sure the security aspect is covered in website - common security vulnerabilities should be handled, customer data should be secured and not be available to hackers etc.

    $171 (Avg Bid)
    $171 Avg Bid
    22 bids

    ...seems there are so many vulnerabilities associated with it. I would need someone to scan those vulnerabilities and apply recommended fixes to them. Basically, i have installed WAMP server and i have placed my project under www folder. So far i have made the website up and running locally. However, there are many vulnerabilities and i need help in fixing

    $267 (Avg Bid)
    $267 Avg Bid
    21 bids

    explore and evaluate the vulnerabilities of wireless devices through researching existing literature articles, journals, white papers, and practical experiments with use of screenshots. once experiments complete explore mitigation techniques that can be employed.

    $230 (Avg Bid)
    $230 Avg Bid
    12 bids

    Hi Can you please check our server code files and server settings for vulnerabilities and fix them. Our server runs our Accounting/Inventory system ([login to view URL] [login to view URL] Based on a modified FrontAccounting ERP. And also a custom web app for our wholesale customers to check stock and order, as well as for staff to edit price list, view some

    $733 (Avg Bid)
    $733 Avg Bid
    1 bids

    ...your website's code which has allowed an attacker to inject malicious scripts into your website. Normally this is possible via exploitable vulnerabilities in out-of-date software in your site's application such as plugins or themes which you have installed. It is also possible due to poor security practices in custom-written website code, or insecure

    $232 (Avg Bid)
    $232 Avg Bid
    26 bids

    ...exporting raw data and access governed by roles. Function Some examples of views that shall be available: Pie chart distributing vulnerabilities by severity, critical/high/medium Summary table of each host’s vulnerabilities with the CVSS base score. Most vulnerable hosts, list. One table pr vulnerability with affected hosts. All reports shall be

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    5 bids

    1. 1. Evaluate the Sonarqube report and then correct all vulnerabilities of the codes 2. Suggest new or better ways to the code logic wherever possible

    PHP
    $151 (Avg Bid)
    $151 Avg Bid
    13 bids

    I need a website that takes a URL as an input and then checks the other site for security vulnerabilities. And gives the output as a result which contains all the flaws the input URL site has and possible ways to improve it. It would be preferred if the built site could later be integrated into an android app. The site which you have to build needs

    $290 (Avg Bid)
    $290 Avg Bid
    12 bids

    We are updating our custom software. 90% is perl in cgi,...custom software. 90% is perl in cgi, 10% php support scripts. Updates will be to update our encryption we use for users information, checking current software for known vulnerabilities, and making some custom changes. Will be looking for more work as time goes on (Read: could be longer term)

    $3610 (Avg Bid)
    $3610 Avg Bid
    31 bids

    build a website in which the website should be able to find all the list of the vulnerabilities present in the website entered in the search box using vulnerabilities searching tools ..

    $146 (Avg Bid)
    $146 Avg Bid
    2 bids

    Need a program in C / C ++ for pentest of a virtual machine in Linux environment. I need a specialist in vulnerabilities. The budget is 50 dollars.

    $128 (Avg Bid)
    $128 Avg Bid
    9 bids

    ...to enter the domain and make a full pentest. We need the system to check agains all vulnerabilities. The system must have a easy to use UI and should give us a full reports as a PDF file. Please tell us in which framwork you would set it up and whicht vulnerabilities would be tested. You can use Source from Guthub etc. - but we need a nice Graphical

    $1911 (Avg Bid)
    $1911 Avg Bid
    18 bids

    Need a program in C / C ++ for pentest of a virtual machine in Linux environment. I need a specialist in vulnerabilities. The budget is 50 dollars.

    $147 (Avg Bid)
    $147 Avg Bid
    7 bids

    ..."some pages on this site may have been hacked by a third party or display spammy content or links, you should take immediate action to clean your site and fix any security vulnerabilities" pages affected [login to view URL] [login to view URL] [login to view URL] We need 1 - both sites cleaned 2 - any wordpress addins

    $368 (Avg Bid)
    $368 Avg Bid
    33 bids

    Objectives 1. Analyse the given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following

    $145 (Avg Bid)
    $145 Avg Bid
    17 bids

    ...operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test results of the remediation strategy. • Finally, you are

    $163 (Avg Bid)
    $163 Avg Bid
    3 bids

    ...testing not server security. We want to arrange an independent test to see if the web software system security is good, bad, or ugly and find weaknesses and vulnerabilities. We can give login name and passwords so that tests can be carried out while logged in and also not logged in. The software is written using ASP.net, some Java, uses a SQL backend

    $624 (Avg Bid)
    $624 Avg Bid
    7 bids

    Required: .Net, SQL, C#, Web Security, SQL Injection, XSS etc, Proficiency in English in an academic level. Two basic websites need to be tested and compared in terms of security vulnerabilities. And a short report required for findings. . Project: Source files and DB .bak file and testing guidance document will be provided (needed: Visual Studio

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    10 bids

    I need a website that takes a URL as an input and then checks the other site for security vulnerabilities. And gives the output as a result which contains all the flaws the input URL site has and possible ways to improve it. It would be preferred if the built site could later be integrated into an android app.

    $204 (Avg Bid)
    $204 Avg Bid
    3 bids

    i have a script which scans a docker image frequently for vulnerabilities , it runs fine for first time scans and stores output, but it fails to pic the next image to scan

    $41 (Avg Bid)
    $41 Avg Bid
    5 bids

    Objectives 1. Analyse the given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system

    $226 (Avg Bid)
    $226 Avg Bid
    10 bids

    I would like someone expert to web safety and security to check a web application. Web application is developed in html, css, jquery, php, mysql. I would like him to check for all possible vulnerabilities and provide constructive feedback and basic repair instructions. The web app is really simple with just an authentication and a form consisting of

    $48 (Avg Bid)
    $48 Avg Bid
    21 bids

    ...methodology. 2. Details of the vulnerabilities you have discovered. Screenshot. 3. Descriptions of the exploits you used to exploit the discovered vulnerabilities. 4. Details of unsuccessful tests. 5. The process and techniques you used, including the tools and commands used. 6. Possible mitigations for each of the vulnerabilities. Your submitted document

    $163 (Avg Bid)
    $163 Avg Bid
    14 bids

    ...operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test results of the remediation strategy. • Finally, you are

    $85 (Avg Bid)
    $85 Avg Bid
    3 bids

    ...authentication. PLEASE NOTE: Accepted reports must follow VeraCrypt's Security Model (see attached PDF) • QUALIFICATION • Only CRITICAL vulnerabilities that demonstrate complete compromise of the system's integrity or confidentiality are eligible for payment - typically Arbitrary Code Execution or equivalent impact. Lower severity issues are not in...

    $366 - $1099
    $366 - $1099
    0 bids

    ...designed for a mainframe security plan 3.9.1 Understanding and Approach to Provide UNISYS Mainframe Compliance - Serve as a Mainframe UNISYS technical specialist to support cybersecurity and IT services. • Assess, audit, review, analyze, validate, and report Mainframe SRG and STIG vulnerabilities, and ensure security controls are implemented

    $57 / hr (Avg Bid)
    $57 / hr Avg Bid
    12 bids

    ...operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test results of the remediation strategy. • Finally, you are

    $214 (Avg Bid)
    $214 Avg Bid
    4 bids

    Need a program in C / C ++ for pentest of a virtual machine in Linux environment. The description of vulnerabilities is, the program’s sketches are available.

    $289 (Avg Bid)
    $289 Avg Bid
    7 bids

    ...funding through Ethereum, Our solution shall support investments with multiple currencies. SECURITY We follow the industry standard best practices to develop flawless and fully secure web application.. Our codes are free from all OWASP reported vulnerabilities SMART CONTRACT RECOMMENDATIONS Pausing- Zeppelin process lifecycle management as damage control

    $8250 (Avg Bid)
    $8250 Avg Bid
    26 bids

    ...Unfortunately, placing the files in quarantine is often insufficient. Probably the files were placed on our website via a leak. Therefore the website must be check for vulnerabilities and be corrected. A new payment plugin must be installed. Also we bought a new template this template must be installed and the website must be renewed. the menu structure

    $340 (Avg Bid)
    $340 Avg Bid
    26 bids

    I want one windows application which is able to scan URL and find vulnerabilities and generate report after penetration testing. I want it for black box security audit which will be able to categorized vulnerabilities from OWASP top 10, also it will able to update its vulnerability database from OWASP, For reference, you can check Acuntix web vulnerability

    $166 (Avg Bid)
    $166 Avg Bid
    12 bids

    ...version running Once all the databases and their running versions are identified, these versions should be compared to the CVE database to see if there are any Critical or vulnerabilities with the version Output of this should be, if there is a Critical vulnerability, to the PCI-notification slack channel (channel needs to be created) Each month a new Jira

    $29 (Avg Bid)
    $29 Avg Bid
    1 bids

    Hi there, After running Detectify, vulnerabilities has been exposed such as CORS Reflects Origin, Login Cross Site Request Forgery (CSRF/XSRF), Unencrypted Login Sessions etc. The site is developed using Angular JS. Experienced programmer who fixed such issues are requested to bid. Thanks Ziad

    $276 (Avg Bid)
    $276 Avg Bid
    20 bids

    Hello! I am interested in looking for some expert in finding sql injection vulnerabilities We have already been informed that there are SQL vulnerabilities. We need to know what vulnerabilities it has and how to take advantage of them to fix them. Thank you.

    $9 / hr (Avg Bid)
    $9 / hr Avg Bid
    18 bids

    ...demonstrate that how to mitigate if you dont close this vulnerabilities, and what is the causes and impact. is there a work around solution? you need to explain and write. It would be good if you can attach screenshot If you can find different kind of vulnerabilities from different vulnerabilities assessment tool. please help to write. because this is

    $164 (Avg Bid)
    $164 Avg Bid
    13 bids

    I had some list of exposed public Ip addresses I need to run Nmap on those to find vulnerabilities on this address any thoughts Note: I am authorized to explore them

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    25 bids

    * Prepare a list of vulnerabilities * Guide on how to resolve them * Anything else that I should know and documents that I must have (to be suggested by bidder)

    $249 (Avg Bid)
    $249 Avg Bid
    18 bids

    ...sector...(Please help to write with your experience and creativity, base on vulnerability assessing the client) Summary of Finding We will be performing three type of vulnerabilities assessment scan to your organization(You three Scan are base on best practice, you need to explain why you are using this from tenable nessus website) Please write why

    $152 (Avg Bid)
    $152 Avg Bid
    23 bids

    This is the research that i am doing is to learn what happens in eternal blue. I wanted to know the technical terms and the vulnerabilities.

    $104 (Avg Bid)
    $104 Avg Bid
    11 bids

    *NOTE* THE ACTUAL REWARD IS HIGHER, WE ARE PAYING $500+ BUT FREELANCER IS HAVING ISSUES *NOTE* Hello! We are looking for people to find XSS / SQL vulnerabilities across our website. Our website is : [login to view URL] If the XSS allows for cookie theft, or you are able to SQL in game items the reward given will be higher.

    $15 (Avg Bid)
    Guaranteed Top Contest
    $15
    3 entries

    Hello, I am looking for someone to find XSS Vulnerabilties on https://roblox.com. I will be paying $200 for any XSS found that allows me to steal a users cookie.

    $330 (Avg Bid)
    $330 Avg Bid
    8 bids

    ...Thinking about Security Vulnerabilities and Loss of Attainable For this situation: You have been hired by your employer or an organization you are familiar with, to manage the IT department. The CEO meets with you and asks you to prepare a report pointing out potential security vulnerabilities at the organization. Write a report discussing security vulnerabil...

    $84 (Avg Bid)
    $84 Avg Bid
    25 bids

    We have a website created. There are some vulnerabilities identified by the audit team. Those are to be fixed. The estimated cost for it? Thanks

    $405 (Avg Bid)
    $405 Avg Bid
    10 bids

    ...the existing design/implementation. * Develop innovative object-oriented, reusable, and stable code, and deliver solutions on schedule in an Agile environment. * Create beautiful, interactive and easy-to-use web applications using rich client-side code. * Develop and develop applications using suitable development methodologies and standards, applying

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    34 bids

    ...the existing design/implementation. * Develop innovative object-oriented, reusable, and stable code, and deliver solutions on schedule in an Agile environment. * Create beautiful, interactive and easy-to-use web applications using rich client-side code. * Develop and develop applications using suitable development methodologies and standards, applying

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    19 bids

    Need report on vulnerabilities of Linux Debian 5/6 with reports not more than 3000 words and screenshots of the vulnerabilities and remedies Chat to learn more

    $145 (Avg Bid)
    $145 Avg Bid
    14 bids