The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#51
|
||||
|
||||
find
PHP Code:
PHP Code:
only joking. |
#52
|
|||
|
|||
lol This was taking stright from the users plugin code. He should fix that.
|
#53
|
||||
|
||||
Quote:
Basically when a product is first installed (not updated) it tries to link to /vborg_miscactions.php?do=installhack. If the link is made then it's the same as manually clicking install, if the link fails then nothing at all happens. The same happens if you uninstall a product. It has nothing to do with plugins within plugins, backdoors, security, added functionality or anything else mentioned, it's a simple link back to the vb.org site. As far as I can tell - it will also fail unless you are logged into vb.org at the time, meaning it's not actually that useful, the majority of people still actually have to click the links manually. If this thead really is about this then it's unbelievably over the top - reading the first post gives the impression of some major security threat or alert, not some minor call back to vb.org. |
#54
|
||||
|
||||
I think it's also a preemptory warning. Spyware (because that's what it is when you get down to it, doing an action the user didn't consent to) won't be tolerated.
|
#55
|
||||
|
||||
Quote:
Quote:
|
#56
|
|||
|
|||
@Paul, thats why this thread is here. Because you and a few others added a link back to the vb.org site.
|
#57
|
||||
|
||||
Quote:
|
#58
|
||||
|
||||
Thanks for telling us
|
#59
|
|||
|
|||
Quote:
|
#60
|
|||
|
|||
This is, as you say, about trust, therefore the list of known affected hacks MUST be disclosed, without question.
|
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|