shopxo icon indicating copy to clipboard operation
shopxo copied to clipboard

ShopXO企业级免费开源商城系统,可视化DIY拖拽装修、包含PC、H5、多端小程序(微信+支付宝+百度+头条&抖音+QQ+快手)、APP、多仓库、多商户、多门店、IM客服,进销存遵循MIT开源协议发布、基于ThinkPHP8框架研发

Results 46 shopxo issues
Sort by recently updated
recently updated
newest added

`$temp_file[0]` would make it more concise

[注册 form 页面](https://github.com/gongfuxiang/shopxo/blob/master/app/index/view/default/user/reg_info.html#L72)跟[js](https://github.com/gongfuxiang/shopxo/blob/master/public/static/common/js/common.js#L270)获取属性流程根本走不下去,原因是 form 表单中没有`editor-tag`的属性,希望作者可以重视并修复 @gongfuxiang

nginx端口8443 php版本 7.2.24 ``` * @author Devil * @blog http://gong.gg/ * @version 0.0.1 * @datetime 2016-12-03T21:58:54+0800 * @param [string] $url [url地址] * @param [string] $data [发送参数] */ function FsockopenPost($url, $data...

Affects version `shopxo 2.2.0` After entering the management page as admininstrator there is an arbitrary file upload vulnerability in 3 locations , you can upload webshell into the site. ##...

2.2.0 从github安装后,购买商品时,选择商品规格报错: 商品id有误。订单提交后报错:商品信息为空

bug: 退款时选择了理由后立即提示:请选择退款理由

Can I ask you according to GitHub recommendation create create a SECURITY.md file to someone like me report security vulnerabilities in a confidential communicational channel ?

Hey there! I'd like to report a security issue but cannot find contact instructions on your repository. If not a hassle, might you kindly add a `SECURITY.md` file with an...

You previously fixed one vulnerability of the theme file upload . ![image](https://user-images.githubusercontent.com/71314272/128828715-a18fcec6-967f-43da-ad80-efb26b90a34d.png) ![image](https://user-images.githubusercontent.com/71314272/128828793-e83b7d13-c506-4ec0-bd89-5311894d1a4f.png) But now there is a similar vulnerability in `/app/admin/appmini.php`,because you didn't use the above method. ![image](https://user-images.githubusercontent.com/71314272/128829092-120546ef-d721-4972-9175-f2475ec0ac82.png) ![image](https://user-images.githubusercontent.com/71314272/128829145-36670eb7-8f8a-427c-bbda-9cbb5b4c89b8.png)...