PHP protection of GET parameters

╄→尐↘猪︶ㄣ 提交于 2019-11-28 11:23:55
Intrepidd

Of course, never ever ever consider a user entry (_GET, _POST, _COOKIE, etc) as safe.

Use mysql_real_escape_string php function to sanitize your variables: http://php.net/manual/en/function.mysql-real-escape-string.php

About SQL injections : http://en.wikipedia.org/wiki/SQL_injection

All depends on the filtering you explicitely (with filter_var() for instance) or implictely (by using prepared statements for instance) use.

Well there is Sql injection http://en.wikipedia.org/wiki/SQL_injection

标签
易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!