![]() |
Quote:
|
Quote:
That way we can use it at our own risk for the time being. also i'm sure if you release a fix, the admins at this site would be able to test if any of the exploits still existed in your fix. as an example of a fix tut, all you would have to do is something like this. file: file name find this: dikgjdijdjf change to this: jdgjdiogjd template: xyz find this:ikdgkdgd change to this:digidg That way we can make the changes our self if you cant release a file. Thanks for anything you can offer, if not, its cool, and hopefully you will be able to keep us udpated with anything you hear. Thanks. |
Quote:
|
Ill give it another week before I release my notes. This way I know nothing else on my forum got messed up or is at risk.
|
Quote:
|
Just rem, there are 2 things to consider.
1: You patch like me and thus removing some function as it was designed. or 2: You attemp to use html strippers, etc that should in theory negate any harmful script or text input. Oh yea, forgot, there is a apache mod too for harmful scripts... In a nutshell, I may give my users elements from the items, but I may disable things from it. All I know is nothing too major has come up yet with all the stuff I do. =) Just wish I had a way to upgrade to 3.6 without losing all my work.. sigh... thats the only reason I dont upgrade is because I have alot of custom coded work in there. |
All times are GMT. The time now is 12:56 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|