Cimmerian Nights said:This never happens at Duck and Cover.
Thats the same as inviting someone to try oO
Cimmerian Nights said:This never happens at Duck and Cover.
generalissimofurioso said:Well, all he got was a password that I don't use for anything anymore.
Oooooh, enjoy attempting to pretend to be me on here.
That's all he could do with it.
you can use the mysql_real_escape_string() function before using a variable in a sql statement. A nice & easy tutorial can be found hereCorith said:Code:array_walk($_GET, 'RemoveSQLInc'); function RemoveSQLInc(&$value, $key) { $search = array("/delete /i", "/update /i","/union /i","/insert /i","/drop /i","/#/i","/'/i","/=/i","/--/i"); $replace = ''; $value = preg_replace( $search, $replace,$value ); }
Boomi said:In addition to:
you can use the mysql_real_escape_string() function before using a variable in a sql statement. A nice & easy tutorial can be found here
bntest said:*words almighty*
sea said:Also double-posts are fun.
Fantastic.Lexx said:Morbus said:Todd Howard hacked NMA? That's just... just...
http://cdn.buzznet.com/assets/imgx/1/4/4/2/1/7/4/1/orig-14421741.jpg![]()
Corith said:Mysql_real_escape_string() has to be applied to the mySQL statement, and Odin fessed up about not being all that savy of a programmer, so I was thinking of a global band-aid. By itself, it offers insufficient protection for a true SQL injection attack. It also does not escape % and _ wildcards in MySQL.
phpBB out of the box is very vulnerable to injection attacks. Even on its form posting it offers little in the way of protection.