This reminds me of the day that my AVG client decided to play with me, saying that there was a potential threat in one of the TF cookies, in the end, it was how AVG scanned cookies, and saw a signature of Harpers, that had a format c:/ line in it. AVG just flipped out....
BUT guess WHAT!!!! That gave me an idea, and sure enough I am blocking something on the SuperPI page, first page! Inside hmammen's signature, are two pictures it appears, that are pulled via php.
Now, if the admins here would kindly look at that signature, easily found on page one of the super PI thread, *The Official Tech-Forums Super Pi 1M Rankings*
Look at his signature, I see two "images" being blocked, Chrome blocked these for me, thanks to several "addons" in my browser, but MSE still has those two logged as potential threats due to how the images are made, it appears he has just [img]link.php=username[/ img] which honestly, can be a security threat as that php script is ran every time a user sees that signature.
This is IMO an issue on both ends, we shouldn't be able to have PHP links in our signatures in that manor, as it's executing a script, doesn't matter where the script is being executed, but it can be a dangerous script in the end. It is almost as if a user was allowed to use HTML in their signature.
In my case, when I had AVG it was more or less AVG being overly happy to scan cookies. In this case, I feel it could be a threat in the end, Mak/Ksod, be a bit easier on the guy, the only reason I bothered to check that thread is because I noticed an old username listed in that link, that eset blocked.
Mike, curious, exactly how is ESET setup on your computer?
How did an edit post turn into a reply? o.0