<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=7641&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Username Sanitisation]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=7641</link>
		<description><![CDATA[The most recent posts in Username Sanitisation.]]></description>
		<lastBuildDate>Fri, 05 Dec 2025 14:27:12 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Username Sanitisation]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=60396#p60396</link>
			<description><![CDATA[<p>Pretty sure you could insert comment blocks /**/ instead of relying on spaces as separators. So disabling spaces might not make much difference, in the grand scheme of things, though in my opinion, they should be disallowed.</p><p>I had a look for known CVEs and only found an earlier SQL injection, relating to a different script, but admittedly didn&#039;t look very hard...</p>]]></description>
			<author><![CDATA[dummy@example.com (blackhole)]]></author>
			<pubDate>Fri, 05 Dec 2025 14:27:12 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=60396#p60396</guid>
		</item>
		<item>
			<title><![CDATA[Re: Username Sanitisation]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=60380#p60380</link>
			<description><![CDATA[<p>I wasn&#039;t planning to try anything because i was worried about being flagged and/or ip banned,especially if leaving in whitespace was intentional and there were safety measures in place. </p><p>But that doesn&#039;t seem to be the case (due to how you replied) , so I&#039;m going to poke and see if i succeed at anything, and if i succeed or find anything noteworthy I&#039;ll send a mail to you, golinux and fsmithred. </p><p>And i don&#039;t want to ruin this place, it&#039;s nice.</p>]]></description>
			<author><![CDATA[dummy@example.com (sun skin only)]]></author>
			<pubDate>Thu, 04 Dec 2025 21:21:22 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=60380#p60380</guid>
		</item>
		<item>
			<title><![CDATA[Re: Username Sanitisation]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=60363#p60363</link>
			<description><![CDATA[<p>When you try it, please don&#039;t do something destructive in case you succeed.</p>]]></description>
			<author><![CDATA[dummy@example.com (ralph.ronnquist)]]></author>
			<pubDate>Thu, 04 Dec 2025 01:36:26 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=60363#p60363</guid>
		</item>
		<item>
			<title><![CDATA[Username Sanitisation]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=60359#p60359</link>
			<description><![CDATA[<p>TL;DR<br />Is the site (<a href="https://dev1galaxy.org" rel="nofollow">https://dev1galaxy.org</a>) vulnerable to sql injection via the username field (register and login) due to allowing whitespace (check my name)?</p><p>LONG <br />Seached the forum quickly and found nothing on this. Referencing TL;DR, since most sites i see,don&#039;t allow whitespace and people use <span class="bbc"> _</span>&#160; and</p><p><span class="bbc">-</span> instead. I&#039;m not someone that has skills myself but i learn about cyber security for the sake of general knowledge. The reason i&#039;m writing this is</p><p>for personal peace of mind, not to say anyone&#039;s incompetent since there&#039;s anti-bot measures and such, but if this was an oversight then i&#039;d rather say something </p><p>than not. Else thank you for the constant maintainance of the site. Also if you maintain Devuan.org, thanx for the lack of cookies and JS.</p>]]></description>
			<author><![CDATA[dummy@example.com (sun skin only)]]></author>
			<pubDate>Thu, 04 Dec 2025 00:54:19 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=60359#p60359</guid>
		</item>
	</channel>
</rss>
