Plugin Directory

Changeset 3478234


Ignore:
Timestamp:
03/09/2026 02:47:59 PM (3 weeks ago)
Author:
scheeeli
Message:
  • Fixed PHP Object Injection vulnerability with DB Scan.
Location:
gotmls
Files:
3 edited
20 copied

Legend:

Unmodified
Added
Removed
  • gotmls/tags/4.23.88/index.php

    r3470614 r3478234  
    1111License: GPLv3 or later
    1212License URI: https://www.gnu.org/licenses/gpl-3.0.html#license-text
    13 Version: 4.23.87
     13Version: 4.23.88
    1414Requires PHP: 5.6
    1515Requires CP: 1.1.1
     
    634634    $moreJS = "";
    635635    $finJS = "\n}";
     636    $user_donations_src = 0;
    636637    $form = 'registerKeyForm';
    637638    $innerHTML = "<li style=\\\"color: #f00\\\">Your Installation Key could not be confirmed!</li>";
  • gotmls/tags/4.23.88/readme.txt

    r3470614 r3478234  
    88License: GPLv3 or later
    99License URI: https://www.gnu.org/licenses/gpl-3.0.html#license-text
    10 Version: 4.23.87
    11 Stable tag: 4.23.87
     10Version: 4.23.88
     11Stable tag: 4.23.88
    1212Requires at least: 3.3
    1313Tested up to: 6.9.1
     
    100100
    101101== Changelog ==
     102
     103= 4.23.88 =
     104* Fixed PHP Object Injection vulnerability with DB Scan.
    102105
    103106= 4.23.87 =
     
    522525== Upgrade Notice ==
    523526
     527= 4.23.88 =
     528Fixed PHP Object Injection vulnerability with DB Scan.
     529
    524530= 4.23.87 =
    525531Checked code for compatibility with WordPress 6.9.1 and ClassicPress 2.6.
  • gotmls/tags/4.23.88/safe-load/trace.php

    r3470614 r3478234  
    55*/
    66
    7 define("GOTMLS_Version", '4.23.87');
     7define("GOTMLS_Version", '4.23.88');
    88define("GOTMLS_SAFELOAD_DIR", dirname(__FILE__)."/");
    99define("GOTMLS_CHMOD_FILE", 0644);
     
    195195
    196196function GOTMLS_uckserialize($unsafe_serialized) {
    197     if (!(is_array($unsafe_serialized)) && (is_array($safe_unserialized = @unserialize(preg_replace('/[oc]:\d+:".*?":(\d+):\{/is', 'a:\1:{', $unsafe_serialized)))))
     197    if (!(is_array($unsafe_serialized)) && (is_array($safe_unserialized = @unserialize(preg_replace('/[oc]:[\+\d]++:".*?":([\+\d]++):\{/is', 'a:\1:{', $unsafe_serialized)))))
    198198        return $safe_unserialized;
    199199    return $unsafe_serialized;
  • gotmls/trunk/index.php

    r3470614 r3478234  
    1111License: GPLv3 or later
    1212License URI: https://www.gnu.org/licenses/gpl-3.0.html#license-text
    13 Version: 4.23.87
     13Version: 4.23.88
    1414Requires PHP: 5.6
    1515Requires CP: 1.1.1
     
    634634    $moreJS = "";
    635635    $finJS = "\n}";
     636    $user_donations_src = 0;
    636637    $form = 'registerKeyForm';
    637638    $innerHTML = "<li style=\\\"color: #f00\\\">Your Installation Key could not be confirmed!</li>";
  • gotmls/trunk/readme.txt

    r3470614 r3478234  
    88License: GPLv3 or later
    99License URI: https://www.gnu.org/licenses/gpl-3.0.html#license-text
    10 Version: 4.23.87
    11 Stable tag: 4.23.87
     10Version: 4.23.88
     11Stable tag: 4.23.88
    1212Requires at least: 3.3
    1313Tested up to: 6.9.1
     
    100100
    101101== Changelog ==
     102
     103= 4.23.88 =
     104* Fixed PHP Object Injection vulnerability with DB Scan.
    102105
    103106= 4.23.87 =
     
    522525== Upgrade Notice ==
    523526
     527= 4.23.88 =
     528Fixed PHP Object Injection vulnerability with DB Scan.
     529
    524530= 4.23.87 =
    525531Checked code for compatibility with WordPress 6.9.1 and ClassicPress 2.6.
  • gotmls/trunk/safe-load/trace.php

    r3470614 r3478234  
    55*/
    66
    7 define("GOTMLS_Version", '4.23.87');
     7define("GOTMLS_Version", '4.23.88');
    88define("GOTMLS_SAFELOAD_DIR", dirname(__FILE__)."/");
    99define("GOTMLS_CHMOD_FILE", 0644);
     
    195195
    196196function GOTMLS_uckserialize($unsafe_serialized) {
    197     if (!(is_array($unsafe_serialized)) && (is_array($safe_unserialized = @unserialize(preg_replace('/[oc]:\d+:".*?":(\d+):\{/is', 'a:\1:{', $unsafe_serialized)))))
     197    if (!(is_array($unsafe_serialized)) && (is_array($safe_unserialized = @unserialize(preg_replace('/[oc]:[\+\d]++:".*?":([\+\d]++):\{/is', 'a:\1:{', $unsafe_serialized)))))
    198198        return $safe_unserialized;
    199199    return $unsafe_serialized;
Note: See TracChangeset for help on using the changeset viewer.