![]() |
major security hole in uShop
Hi guys, i've noticed that if im in the shop and uses this link:
.../ushop.php?do=richestusers&page=<script>alert("Owne d%20By%20FatalBreeze")</script> it works!! maybe we should just add intval() or something like that? as a noob coder im not exactly aware of the consequences this may have, but i guess they are pretty harsh. btw, im using the latest version of uCash&uShop on vB 3.5.4. |
uCS is no longer supported, or developed and we've already made refrences to move off of it.
|
All times are GMT. The time now is 08:36 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|