teitbite
Thank you for your quick reply. Actually I meant XSS of course đŸ˜›. I've compared your file with the file on the server and two lines differ.
1)
your line:
<?php echo $this->data->name; ?>
line on the server:
<?php echo $this->escape($this->data->name); ?>
2)
your line:
<?php echo htmlspecialchars($this->data->username, ENT_COMPAT, 'UTF-8'); ?>
line on the server:
<?php echo $this->escape($this->data->username); ?>
I think two thinks could have happened: The files got corrupted as you stated, or Patchman patched the two lines by adding 'escape' to the first line and replace 'htmlspecialchars' with 'escape' on the second. The date stamp of the Patchman notifcation email is the same as the one from the file adjustment. Could the missing 'escape' be the XSS issue? I must confess, I'm not familiar with the subject, though a quick Google on the subject learned me that 'escape' is used to prevent SQL injection by replacing special characters. I could change the file on the server and wait if Patchman patches it again?
Kind regards,
René