![]() |
VB Attachment Validation
Given the currently un-patched Windows vulnerability out there regarding rogue .wmf files, I have a question. Does VB actually check the code of the file supplied (i.e. through a gd call in PHP) or is simply checking the extension of the file?
If it simply checks the extension, is anyone one else, who allows file uploads, doing anything to screen files more securely? |
All times are GMT. The time now is 03:15 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|