ExtBasic 7

Learn how to do code review

ExtBasic 7

Post by super_ on Fri Aug 08, 2008 6:49 pm
([msg=9138]see ExtBasic 7[/msg])

this thing is really screwing me over :p.

i discovered the XSS vuln and the GET bug and upon fixing them it doesnt work. ive tried all different kinds of sanitation of the XSS vulnerable variable, including htmlspecialchars(...), htmlspecialchars(..., ENT_QUOTES), htmlentities(...), addslashes(..), urlencode(...) *Q: does this even make sense to use??*..

please help lol this thing is driving me nuts.
super_
New User
New User
 
Posts: 7
Joined: Fri Aug 08, 2008 6:24 pm
Blog: View Blog (0)


Re: ExtBasic 7

Post by BhaaL on Sat Aug 09, 2008 6:13 am
([msg=9164]see Re: ExtBasic 7[/msg])

Note that the <?= Syntax is short for something, and the command itself is delimited by the closing ?>. Means there is something you can (in this case have to) leave out.
BhaaL
Poster
Poster
 
Posts: 270
Joined: Sun Apr 13, 2008 11:16 am
Blog: View Blog (0)


Re: ExtBasic 7

Post by super_ on Sat Aug 09, 2008 9:30 am
([msg=9173]see Re: ExtBasic 7[/msg])

<?= .... ?> is short for <?php echo .... ?>. but im stumped onto what i have to leave out
super_
New User
New User
 
Posts: 7
Joined: Fri Aug 08, 2008 6:24 pm
Blog: View Blog (0)



Return to Extended Basics

Who is online

Users browsing this forum: No registered users and 0 guests

cron