John Poulin
John Poulin
@seyhunak This is quite concerning because this vulnerability was addressed in 2014. Read about it in this blog post: https://nvisium.com/blog/2014/03/28/reflected-xss-vulnerability-in-twitter/ Relevant commit: https://github.com/seyhunak/twitter-bootstrap-rails/commit/663760e67b80ee25adc293bf5f03debae28b5af9
Let's keep it simple: - Referer - UA - IP Address - Job Posting ID This will allow companies to view the analytics about their job postings.
Yep, a few wrong examples here. Got carried away with the `?`'s
@meowris This will have a UI component. Essentially, need a way to easily view responses that match a certain condition for a job.
This is basically done. Need to add the following: 1) Ability to download raw http response from UI. 2) Ability to store and view associated payload.
Need to add ability to scan 400 + 500 respones codes.
Waiting on bugfix / solution for https://github.com/sparklemotion/mechanize/issues/446