Jump to content

Recommended Posts

No, it is not just as good. If it was, you wouldn't have mysql_real_escape_string();

 

This code does nothing dangerous by itself, but can show attacker, that there's a vulnerability in your script they can exploit.

Did they manage to run in on your database, or did you filter it out?

 

If this actually got stored in database, nothing wrong happened. It means your script is secure against this kind of attack.

 

You pasted this code on this forum, and it got stored in database, because we can see it. It didn't execute, and as such is harmless.

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.