HalfAway
Thanatos
What vulnerability exists in ZnoteAAC?You can edit this in the .css file extend the width.
Btw there is a vulnerability in the ZNote ACC Page.
What vulnerability exists in ZnoteAAC?You can edit this in the .css file extend the width.
Btw there is a vulnerability in the ZNote ACC Page.
Yes ofcourse, but instead of just saying "There is a vulnerability" he could tell what the problem is so it can be fixed.There's always vulnerability cause of good hackers.
The problem i've never solved is automatic points by paypal. BUMP
Wait, Doesn't the site add the points automaticly to the account?The problem i've never solved is automatic points by paypal.
Yes ofcourse, but instead of just saying "There is a vulnerability" he could tell what the problem is so it can be fixed.
You can PM @HalfAway he is a big contributor to ZnoteAAC so he will surely fix it and put a fix on github.*in javascript.
I did I think they will bring out a fixed version soon. I also have code improvements in style.css and .js My Site is loading alot faster now.You can PM @HalfAway he is a big contributor to ZnoteAAC so he will surely fix it and put a fix on github.
and i create the talckaction znoteshop.lua:<talkaction words="!shop" script="znoteshop.lua"/>
function onSay(cid, words, param)
local storage = 54073 -- Make sure to select non-used storage. This is used to prevent SQL load attacks.
local cooldown = 15 -- in seconds.
if getPlayerStorageValue(cid, storage) <= os.time() then
setPlayerStorageValue(cid, storage, os.time() + cooldown)
local accid = getAccountNumberByPlayerName(getCreatureName(cid))
-- Create the query
local orderQuery = db.storeQuery("SELECT `id`, `type`, `itemid`, `count` FROM `znote_shop_orders` WHERE `account_id` = " .. accid .. ";")
-- Detect if we got any results
if orderQuery ~= false then
-- Fetch order values
local q_id = result.getDataInt(orderQuery, "id")
local q_type = result.getDataInt(orderQuery, "type")
local q_itemid = result.getDataInt(orderQuery, "itemid")
local q_count = result.getDataInt(orderQuery, "count")
result.free(orderQuery)
-- ORDER TYPE 1 (Regular item shop products)
if q_type == 1 then
-- Get wheight
local playerCap = getPlayerFreeCap(cid)
local itemweight = getItemWeightById(q_itemid, q_count)
if playerCap >= itemweight then
local delete = db.storeQuery("DELETE FROM `znote_shop_orders` WHERE `id` = " .. q_id .. ";")
result.free(delete)
doPlayerAddItem(cid, q_itemid, q_count)
doPlayerSendTextMessage(cid, MESSAGE_INFO_DESCR, "Congratulations! You have recieved ".. q_count .." "..getItemNameById(q_itemid).."(s)!")
else
doPlayerSendTextMessage(cid, MESSAGE_STATUS_WARNING, "Need more CAP!")
end
end
-- Add custom order types here
-- Type 2 is reserved for premium days and is handled on website, not needed here.
-- Type 3 is reserved for character gender(sex) change and is handled on website as well.
-- So use type 4+ for custom stuff, like etc packages.
-- if q_type == 4 then
-- end
else
doPlayerSendTextMessage(cid, MESSAGE_STATUS_WARNING, "You have no orders.")
end
else
doPlayerSendTextMessage(cid, MESSAGE_STATUS_CONSOLE_BLUE, "Can only be executed once every "..cooldown.." seconds. Remaining cooldown: ".. getPlayerStorageValue(cid, storage) - os.time())
end
return false
end
It has not been fixed yet. It is still there and the Vuln exist since 2 years regarding to GITHub. If you want I can fix it for you. Just pm me.Vuln fixed yet?
Why don't you make a pull on Github instead of that?It has not been fixed yet. It is still there and the Vuln exist since 2 years regarding to GITHub. If you want I can fix it for you. Just pm me.
What Vuln?Vuln fixed yet?