The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#31
|
||||
|
||||
![]() Quote:
PHP Code:
bbcodeparse and bbcodeparse2 functions are called from many parts of vb code, not only when someone posts a message. Therefore if you apply a hack there you have to make sure, the conditional the hack depends will not be TRUE when the function is called from somewhere else in vb code. Let's discuss on an example: If you apply send PM hack above in this function and make sure it runs when a post has more than 1000 smilies, the poster who will snd a post with 1000 smilies will receive your PM. But if you don't clear all existing posts with 1000 smilies, someone who accidently visited such a post will also receive this PM because the same function will be called and the condition will prove TRUE in showthread.php too. Bottom line is: Before applying such hacks into this function, make sure you cleared all existing posts/PMs from your database in the first place. Then you can be sure the hack will only apply to new posters only as it should.. PHP Code:
|
#32
|
||||
|
||||
![]()
Thanks, Sinan.
![]() By this: Quote:
|
#33
|
||||
|
||||
![]() Quote:
Otherwise the hack code will apply to visitors of these threads too, not only new posters.. |
#34
|
||||
|
||||
![]()
oh, ok, that makes a little more sense now. Thank for explaining that to me.
![]() By the way, where do I set these variables? $greeter="enter senders id"; $receiver="enter receivers id"; $title2="PM title"; |
#35
|
|||
|
|||
![]()
I ckecked that and it's still doing it. It posts the post and then renders the thread useless.
Quote:
|
#36
|
|||
|
|||
![]()
Hmm my windows server seems to be safe against this our at least at the moment. When i add a ton of smilies im guessing near 1000 or so then it says my script did not return a complete set of headers. But if i go to like 900 then my server just flies to the to many images page in under a second.
|
#37
|
||||
|
||||
![]()
Upon checking this, vBulletin 2.30 still shares this vulnerability, so I recommend that users apply this patch promptly.
Kaelon |
#38
|
||||
|
||||
![]()
vBulletin 2.3.2 still, furthermore, still has this vulnerability. I would recommend it be included in vBulletin 3.
|
#39
|
||||
|
||||
![]()
Just curious: Have you ever reported it as a bug in vb.com? I think it deserves to be accepted as a "bug" so I think it would be corrected if reported in vb.com.
|
#40
|
|||
|
|||
![]()
logician is the man!
|
![]() |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|