| in most cases, replace the string function with the drupal_ equivalent string functions | Other | uc_paygate.module | 198 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 241 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 242 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 243 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 244 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 245 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 246 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 247 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 248 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 249 | N/A |  |
| Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 250 | N/A |  |
| Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 271 | N/A |  |
| use <br /> instead of <br> | Other | uc_paygate.module | 271 | N/A |  |
| use <br /> instead of <br> | Other | uc_paygate.module | 273 | N/A |  |
| Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | uc_paygate.module | 294 | N/A |  |
| use <br /> instead of <br> | Other | uc_paygate.module | 294 | N/A |  |
| use <br /> instead of <br> | Other | uc_paygate.module | 296 | N/A |  |