Jump to content
MakeWebGames

Credit Exchange mod New!!


jcvenom

Recommended Posts

Good Job HD

 

 

Sorry to say this, but this module is broken beyond recognition.

Some examples

You are displaying cost of 2 credits for xanax, where when you go forward, it says 2 credits, and the sql says 1.

You're unable to view this code.

Viewing code within this forum requires registration, you can register here for free.

 

Displaying bad request twice? Why?

Opening 2 tables without closing them? Without content either? WHY?

I was initially going to re-code it, but then i thought..

Perhaps you should read some books first and then try create modules. Or expect to see me often pointing out your flaws.

Link to comment
Share on other sites

your escape functions are doing properly sanitize and validate ??? and what are you doing for xss ?

as per my view it is very important part of programming and i am not expert in these but little bit aware about these problem

as per my view it is doesn't matter that you handle values by db or hard code so please try to escape your values properly, this is my point.

Link to comment
Share on other sites

your escape functions are doing properly sanitize and validate ??? and what are you doing for xss ?

as per my view it is very important part of programming and i am not expert in these but little bit aware about these problem

as per my view it is doesn't matter that you handle values by db or hard code so please try to escape your values properly, this is my point.

can you show me what is the problem guy's you need to show me your examples

Link to comment
Share on other sites

if you dont mind why ??? bcz i wanna gain my knowledge so may be it help me ?

- - - Updated - - -

 

am wrong on this point HD ?

ctype_alnum checks if all the characters in your desired string are alphanumeric while ctype_digit() checks for numeric characters

Link to comment
Share on other sites

my point was only safety nothing else friend ,that was just an example for validating

you can use preg_match too and many more so please make it safe bcz get is non hide thing

I'm actually going to challenge you to point out everything wrong (security wise) with this modification. Right now all of your posts are coming across as someone who is just throwing out random functions he thinks are linked to security, but has no idea why.

BTW - please no one else come along and make a list before he answers. I'm trying to make a point to Rockwood...

Link to comment
Share on other sites

I'm actually going to challenge you to point out everything wrong (security wise) with this modification. Right now all of your posts are coming across as someone who is just throwing out random functions he thinks are linked to security, but has no idea why.

BTW - please no one else come along and make a list before he answers. I'm trying to make a point to Rockwood...

Dominion you should check posts chain, i tried to improve his code and he told me escaping is wrong on $_GET variable the question from his side, not from mine and i am trying to explain him about xss attacks

and what is wrong in it ??

Link to comment
Share on other sites

Dominion you should check posts chain, i tried to improve his code and he told me escaping is wrong on $_GET variable the question from his side, not from mine and i am trying to explain him about xss attacks

and what is wrong in it ??

AS my friend venom said this mod is not vulnerable to XSS attacks
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...