| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
Mime-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Message-Id: <Pine.BSF.4.05.9905251441030.23507-100000@home.shiva.eu.org> Date: Tue, 25 May 1999 14:43:25 -0700 Reply-To: Bigby Findrake <bigby@HOME.SHIVA.EU.ORG> From: Bigby Findrake <bigby@HOME.SHIVA.EU.ORG> X-To: Vittal Aithal <vittal.aithal@REVOLUTIONLTD.COM> To: BUGTRAQ@NETSPACE.ORG In-Reply-To: <D0CD3D370F64D211A25900104BAD8D595AAB8B@RMAIL> On Tue, 25 May 1999, Vittal Aithal wrote: > Here's some javascript stuff that'll clean up quotes and things before > having them sent off in a sql query... only tested with access, so YMMV. Do keep in mind that while this will stop people from using the aforementioned exploits *only when using your forms*. It is still possible to download your web pages, remove the javascript hooks, and then submit their information, or call the CGI(if method GET is accepted) by hand and get around such security measures.
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |