<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
	<channel>
		<title><![CDATA[Latest posts for the topic "Quick fix for SQL injection exploit"]]></title>
		<link>https://proxy2.de/forum/posts/list/3.php</link>
		<description><![CDATA[Latest messages posted in the topic "Quick fix for SQL injection exploit"]]></description>
		<generator>JForum - http://www.jforum.net</generator>
			<item>
				<title>Quick fix for SQL injection exploit</title>
				<description><![CDATA[ open up lib/session.class.php and look for [code]function checkPass&#40;$username,$password&#41; &#123;[/code]<br /> <br /> On the next line put the following (rembering to put this between that line and the next line, DO NOT OVERWIRTE THE CURRENT NEXT LINE!)<br /> [code]if &#40;$password != &quot;YOUR  PASSWORD&quot;&#41; $password = &quot;NOTYOURPASSWORD&quot;;[/code]<br /> <br /> Very crude but effective. Just change the YOUR PASSWORD to whatever your password is. I assume with this code that your actual password is not NOTYOURPASSWORD but if it is change this bit.  Also you will need to change this if you ever change your password.]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3343/9107.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3343/9107.php</link>
				<pubDate><![CDATA[Mon, 12 Jul 2004 20:59:44]]> GMT</pubDate>
				<author><![CDATA[ Carbonize]]></author>
			</item>
	</channel>
</rss>