<?xml version="1.0"?><!-- generator="bbPress" -->

<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
>

<channel>
<title>Ace of Spades Game Forums &#187; Topic: DANGER</title>
<link>http://forumarchive.spadille.net/</link>
<description>Ace of Spades Game Forums &#187; Topic: DANGER</description>
<language>en</language>
<pubDate>Sat, 02 May 2026 14:29:46 +0000</pubDate>

<item>
<title>mat^2 on "DANGER"</title>
<link>http://forumarchive.spadille.net/topic.php?id=2157#post-26153</link>
<pubDate>Mon, 13 Jun 2011 16:30:04 +0000</pubDate>
<dc:creator>mat^2</dc:creator>
<guid isPermaLink="false">26153@http://forumarchive.spadille.net/</guid>
<description><p>1337101: What are you talking about? This is not pyspades' fault (and I'm not going to get into how 'hard' it is to download a zip file and extract it).</p>
<p>In any case, this is a major bug from Ben's side, and we can't do anything before he fixes it.
</p></description>
</item>
<item>
<title>Tingle on "DANGER"</title>
<link>http://forumarchive.spadille.net/topic.php?id=2157#post-26112</link>
<pubDate>Mon, 13 Jun 2011 16:09:37 +0000</pubDate>
<dc:creator>Tingle</dc:creator>
<guid isPermaLink="false">26112@http://forumarchive.spadille.net/</guid>
<description><p>It least it has drawn attention. Not everyone has NoScript installed, and yes, this is a server side problem not a problem with pyspades. ALL user input should be sanitised. Rule #1
</p></description>
</item>
<item>
<title>Szuwar on "DANGER"</title>
<link>http://forumarchive.spadille.net/topic.php?id=2157#post-26095</link>
<pubDate>Mon, 13 Jun 2011 15:54:40 +0000</pubDate>
<dc:creator>Szuwar</dc:creator>
<guid isPermaLink="false">26095@http://forumarchive.spadille.net/</guid>
<description><p>It's not PySpades fault you know. There is no filtering of server names on the site so anything goes.</p>
<p>And you can't blame something just because you don't know how to use it. It's like you're mad at your bike because you don't know how to ride it.
</p></description>
</item>
<item>
<title>1337101 on "DANGER"</title>
<link>http://forumarchive.spadille.net/topic.php?id=2157#post-26075</link>
<pubDate>Mon, 13 Jun 2011 15:42:00 +0000</pubDate>
<dc:creator>1337101</dc:creator>
<guid isPermaLink="false">26075@http://forumarchive.spadille.net/</guid>
<description><p>Whoever that ugly person is in the links now, I hope we can get rid of him soon... this is ridiculous.  </p>
<p>Frankly, I'd love an update that made PySpades stop working entirely.  It's hard-to-use and frequently abused.  Lexsym's ServerBot system is far superior, as are vanilla servers.
</p></description>
</item>
<item>
<title>mat^2 on "DANGER"</title>
<link>http://forumarchive.spadille.net/topic.php?id=2157#post-26048</link>
<pubDate>Mon, 13 Jun 2011 15:17:33 +0000</pubDate>
<dc:creator>mat^2</dc:creator>
<guid isPermaLink="false">26048@http://forumarchive.spadille.net/</guid>
<description><p>This is true. I thought Ben knew something about web development, and that he would escape the server name, but apparently not :( There's not much we (the pyspades developers) can do apart from uploading a new win32 build that escapes it automatically, but the old build is still out, so wait for Ben to fix it.
</p></description>
</item>
<item>
<title>nothings on "DANGER"</title>
<link>http://forumarchive.spadille.net/topic.php?id=2157#post-26043</link>
<pubDate>Mon, 13 Jun 2011 15:10:29 +0000</pubDate>
<dc:creator>nothings</dc:creator>
<guid isPermaLink="false">26043@http://forumarchive.spadille.net/</guid>
<description><p>See thread "what the holy" (why do people posting about this not post useful thread titles?). Also, you could mail Ben (I already did) and the pyspades developers, instead of announcing to the entire world how to do the exploit.
</p></description>
</item>
<item>
<title>Tingle on "DANGER"</title>
<link>http://forumarchive.spadille.net/topic.php?id=2157#post-26040</link>
<pubDate>Mon, 13 Jun 2011 15:03:47 +0000</pubDate>
<dc:creator>Tingle</dc:creator>
<guid isPermaLink="false">26040@http://forumarchive.spadille.net/</guid>
<description><p>Arbitrary javascript can be executed on the 'Play' page of the site by editing the server name in pyspades ie;</p>
<p>in config file change server name to "&#60;script&#62;alert('oo');&#60;/script&#62;"</p>
<p>This could be exploited further.
</p></description>
</item>

</channel>
</rss>
