![]() |
Security System fo VB
The idea is very simple yet very effective.
If there was a kind of filter that does: 1- prevent the direct request of files that should never be requested like "config.php" 2- Filter all "url request" from commen words and characters used for sql injections. 3- Filter the "POST Method" from words that usually used in xxs vulnerability. If we can have such system, "I think" we can prevent 99.9% of known and unknown vulnerabilities. Thanks |
Hmmmm... not a bad idea.
One would have to define which words are "commonly used for vulnerabilities" though. I suggest you post at vbulletin.com, maybe the developers can give some feedback about how easy this would be to implement, as well as how useful it would be. |
All times are GMT. The time now is 03:44 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|