Translation for email subscription

I see that if i want to change the emails sent to the users from english language to my language i can`t because those emails formats are inserted on install step..

in files sql/install.sql

for example:

Dear jimie,


You were successfully subscribed to News subscribes!


You may cancel the subscription by clicking the following link: http://www.domainname.com/subscription.php?sid=NSw2


Thank you for using our services!

--

My comunity - mail delivery system!!!
Auto-generated e-mail, please, do not reply!!!

Quote · 23 Nov 2009

All emails are controlled by templates.  You can edit every email template by going ot Admin>Email templates.  There you will see all email templates, click the arrow next to one and a drop box will appear where you can markup the template as you see fit.  Make sure to include all proper html formatting as these are html emails sent.

Quote · 23 Nov 2009

I have tryed to edit a email template and i got this error:

Possible attack!!! All data has been collected and sent to the site owner for analysis.

Someone please add a ticket for this i`m sure that all people will get this error message

Quote · 23 Nov 2009

Nevermind

Email templates needst o be added to possible attack list, as any editing whatsoever causes it.

All I did was delete one ! from one email and it caused the PA, any editing of the templates causes a PA.  Michel please add to ticket list so they can get it fixed.

Quote · 23 Nov 2009

Jimie in the meantime you can make the edits directly to the email templates by changing the body content of the sys_email_templates database.

Quote · 23 Nov 2009

Here is the email from the email template pa:

Total impact: 86
Affected tags: xss, csrf, rfe, id, lfi, sqli

Variable: REQUEST.t_FriendRequest_Body | Value: <html>
<body style=\"font: 12px Verdana; color:#000000\">
<p><b>Dear <Recipient></b>,</p>
<br />
<p><a href=\"<SenderLink>\"><Sender></a> is inviting you to be friends. To accept/reject his/her invitation please
follow this <a href=\"<RequestLink>\">link</a></p>
<br />
<p><b>Thank you for using our services!</b></p>
<p>--</p>
<p style=\"font: bold 10px Verdana; color:red\"><SiteName> mail delivery system!!!
<br />Auto-generated e-mail, please, do not reply!!!</p>
</html>
Impact: 43 | Tags: xss, csrf, rfe, id, lfi, sqli
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: finds malicious attribute injection attempts | Tags: xss, csrf | ID: 69
Description: Detects data: URL injections, VBS injections and common URI schemes | Tags: xss, rfe | ID: 27
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects comments to exploit firefox' faulty rendering and proprietary opera attacks | Tags: xss, csrf, id | ID: 36
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID: 43
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68

Variable: POST.t_FriendRequest_Body | Value: <html>
<body style=\"font: 12px Verdana; color:#000000\">
<p><b>Dear <Recipient></b>,</p>
<br />
<p><a href=\"<SenderLink>\"><Sender></a> is inviting you to be friends. To accept/reject his/her invitation please
follow this <a href=\"<RequestLink>\">link</a></p>
<br />
<p><b>Thank you for using our services!</b></p>
<p>--</p>
<p style=\"font: bold 10px Verdana; color:red\"><SiteName> mail delivery system!!!
<br />Auto-generated e-mail, please, do not reply!!!</p>
</html>
Impact: 43 | Tags: xss, csrf, rfe, id, lfi, sqli
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: finds malicious attribute injection attempts | Tags: xss, csrf | ID: 69
Description: Detects data: URL injections, VBS injections and common URI schemes | Tags: xss, rfe | ID: 27
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects comments to exploit firefox' faulty rendering and proprietary opera attacks | Tags: xss, csrf, id | ID: 36
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID: 43
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68

REMOTE_ADDR: xxxxx
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /administration/email_templates.php
QUERY_STRING:
REQUEST_URI: /administration/email_templates.php
QUERY_STRING:
SCRIPT_NAME: /administration/email_templates.php
PHP_SELF: /administration/email_templates.php
Quote · 23 Nov 2009
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.