Hello MQUINONES,
Your custom css you have to put in the style.custom.css file.
Regards, AS Team.
mquinones
POSTED: 2017-05-17
I hoping you can help me with this problem. Have had several security issues using this template. Have put a scanner on it and I get this message:
Synopsis: A CGI application hosted on the remote web server is potentially prone to SQL injection attack.
Description: By sending specially crafted parameters to one or more CGI scripts hosted on the remote web server, SiteLock was able to get a very different response, which suggests that it may have been able to modify the behavior of the application and directly access the underlying database.
An attacker may be able to exploit this issue to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system.
Note that this script is experimental and may be prone to false positives.
Solution: Modify the affected CGI scripts so that they properly escape arguments.
Technical Details:
Using the GET HTTP method, SiteLock found that :
+ The following resources may be vulnerable to blind SQL injection :
Get an access to all 94 items designed and developed by AS Designing team plus all the future items
which will be released over the course of your club subscription.
Price starting from $59.00
Your custom css you have to put in the style.custom.css file.
Regards, AS Team.
Synopsis: A CGI application hosted on the remote web server is potentially prone to SQL injection attack.
Description: By sending specially crafted parameters to one or more CGI scripts hosted on the remote web server, SiteLock was able to get a very different response, which suggests that it may have been able to modify the behavior of the application and directly access the underlying database.
An attacker may be able to exploit this issue to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system.
Note that this script is experimental and may be prone to false positives.
Solution: Modify the affected CGI scripts so that they properly escape arguments.
Technical Details:
Using the GET HTTP method, SiteLock found that :
+ The following resources may be vulnerable to blind SQL injection :
+ The 'view' parameter of the /index.php CGI :
/index.php?option=com_content&Itemid=101&catid=10&id=68&layout=as002022%
3agallery&view=articlezzcom_content&Itemid=101&catid=10&id=68&layout=as0
02022%3agallery&view=articleyy
-------- output --------
HTTP/1.1 200 OK
-------- vs --------
HTTP/1.1 500 View not found [name, type, prefix]: articleyy, html, contentView
------------------------
Not sure what to do to fix this issue. Can you advise, please??
it points to article id 101, we think you have to check this item.
Regards, AS Team.
When inserting a png in an article rather than transparency, it displays a white rectangle background.
We have tried everything we can think of to no avail.
Please advise.
Example is on bottom of index page of lindagendallart.com. Thank you.
Please see '/templates/as002022/css/tmpl.default.css' file the following class (line 406):
.item_img, .category_img,
.item_fulltext img,
.random-image img,
img.left,
img.right
{
background-color: #fff;
border: 1px solid #e2e2e2;
border-radius: 0;
display: inline-block;
margin-bottom: 25px;
max-width: 97%;
padding: 2px;
}
Regards, AS Team.