Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
*** Serious vulnerability
02-18-2014, 12:33 AM,
#3
RE: Potential vulnerability
(02-18-2014, 12:00 AM)agaluski Wrote: Tim,
The only revision I sent on this file was the below.
/*if (!is_numeric($_POST['Quantity' . $i])){*/
if (!is_numeric(filter_number_format($_POST['Quantity' . $i]))){

Can you tell me where the revision is in the code that you are referring to?

Hi Andrew

it's here:

https://sourceforge.net/p/web-erp/code/6571/

Looking at it I am guessing that the updates to GL_TrialBalance_csv.php are not related to your work, and are possibly an accident by the person committing the work.

Thanks
Tim
Reply


Messages In This Thread
*** Serious vulnerability - by Forums - 02-15-2014, 10:46 PM
RE: Potential vulnerability - by agaluski - 02-18-2014, 12:00 AM
RE: Potential vulnerability - by Forums - 02-18-2014, 12:33 AM
RE: Potential vulnerability - by icedlava - 02-19-2014, 06:00 PM
RE: Potential vulnerability - by phil - 02-19-2014, 06:24 PM
RE: Potential vulnerability - by icedlava - 02-19-2014, 06:30 PM
RE: Potential vulnerability - by Forums - 02-19-2014, 07:28 PM
RE: Potential vulnerability - by icedlava - 02-19-2014, 08:55 PM
RE: Potential vulnerability - by Forums - 02-19-2014, 09:12 PM
RE: Potential vulnerability - by icedlava - 02-19-2014, 10:24 PM
RE: *** Serious vulnerability - by Forums - 02-19-2014, 10:30 PM
RE: *** Serious vulnerability - by icedlava - 02-19-2014, 10:38 PM
RE: *** Serious vulnerability - by Forums - 02-19-2014, 11:22 PM
RE: *** Serious vulnerability - by jo lwebuga - 02-20-2014, 02:35 AM
RE: *** Serious vulnerability - by phil - 02-20-2014, 01:00 PM

Forum Jump:


Users browsing this thread: 1 Guest(s)