You have chosen to sponsor your bid up to a maximum amount of .
Our products finds security vulnerabilities in applications.
We need to add 5 vulnerabilities descriptions to our product, similar to the attached examples.
The required vulnerabilities are :
a. Log forgery
b. Command Injection
c. Path traversal
d. Parameter Tampering
Each description should be comprised of the following sections:
1. Description (What is the risk / What damage can be done)
2. Cause (Why am I seeing this)
3. Recommendations (What do I do now and how do I fix it)
4. Source code examples (C# and Java)
Each of sections 1-3 should not be more than 150 words.
Code examples must be in C# and in Java
In case of a successful engagement, we plan to submit many more description request.