Hello
Naval yesterday you helped me with the PHP code but there is a problem in one part there , im writing something in the posting feild and i get that message all the time :
that is the peice of code that if i remove it it all works good :
i know you changed it for me yesterday but i need to know if i CAN leave this peice of code out side of the "dbts_abvfp.php"
thanks
Naval yesterday you helped me with the PHP code but there is a problem in one part there , im writing something in the posting feild and i get that message all the time :
Fieldvalue = wowowowowowow gggggggggggggg ggggggggggg gggggggggggg gggggggggggg gggggg gggggggggggggggggggggggggggggggg ggggggggggggggggggggg
Warning: Cannot modify header information - headers already sent by (output started at /home/rgajsgjb/public_html/ABVFP/dbts_abvfp.php:264) in /home/rgajsgjb/public_html/ABVFP/dbts_abvfp.php on line 359
Error = The field posting_discription contained e-mail headers in the value submitted. This seems to be a cracking attempt and the message has not been sent.!
Errorpage = http://www.brasilwebdesign.com/ABVFP/errorpage.php
Warning: Cannot modify header information - headers already sent by (output started at /home/rgajsgjb/public_html/ABVFP/dbts_abvfp.php:264) in /home/rgajsgjb/public_html/ABVFP/dbts_abvfp.php on line 359
Error = The field posting_discription contained e-mail headers in the value submitted. This seems to be a cracking attempt and the message has not been sent.!
Errorpage = http://www.brasilwebdesign.com/ABVFP/errorpage.php
Code:
// ------------VALIDATION OF THE FIELDS---------------- // //$i = 0; //for ($i = 0; $i < count($ndfieldname); $i++) { // // Check for injected values, but skip uploaded file fields that always contain %a and %0d // //if ($i < count($ndfieldname) - count($_FILES)) { // //$crack_value = urldecode($ndfieldvalue[$i]); //if (eregi("(\r|\n|%0a|%0d|content-type:|bcc:|cc:|to:|content-type:)", $crack_value)) { //$error .= "The field $ndfieldname[$i] contained e-mail headers in the value submitted. // This seems to be a cracking attempt and the message has not been sent.!\n"; // echo "Fieldvalue = $ndfieldvalue[$i] <br>"; //} //} //
thanks
Comment