xd
(for the non-technical people: this is comically incorrect)
(for op: yes there is a bug where you can double post when you click the button twice, but that only happens when you connection is slow, or when the site is already slow [as is happening right now due to unrelated issues]. also no, passwords are not stored as a plain document, what are you talking about. yes wasteof legacy does have some issues, but something tells me this list [or entire post] is AI generated because “SQL Injection” is one os the funniest things i’ve ever seen since no version of wasteof uses SQL. i can see that you have some actual bugs, but please don’t make up fake stuff and reference the archived wasteof1 repo.)
sry <3
warning!
From the tests i have done, there are many vulnerabilities on this website, there are also a lot of bugs. Example: when posting something, if you spam click `post` it will create a post for every time you click the button, there should be an implementation to limit the time between posts and to make the button a one time click. (THIS BUG MAKES THE SITE LAG!). its also a pain to delete all of the posts if you accidentally do so as the site refreshes but will still lag and there is a small chance that the post will not be deleted. There is also a password vulnerability… maybe don’t have the user’s passwords get stored as a plain document.
THERE ARE VULNERABILITIES IN THE REPO!; Yes, even tho the repo is the legacy site and isn’t used anymore it is still good to state the vulnerabilities on the repo as people might use the template to make their own site like this and wont know of the vulnerabilities in the code:
List of the vulnerabilities on the repo: SQL Injection, Cross-Site Scripting (XSS), Insecure Direct Object Reference (IDOR), Lack of Input Validation, Insecure, Outdated Dependencies, Lack of Error Handling, Insecure Session Managemen, Storage of Sensitive Data(user and password information: Insecure Password Storage, Weak Password Hashing, Lack of Password Salting, Insecure Password Verification, Missing Password Complexity Requirements, insecure Password Reset Token Generation, insecure Password Storage in Sessions), Lack of Secure Communication… sry <3
i worded it wrong, i meant more like don’t report bugs in it since it’s archived and deprecated. you can reference it all you like