php - Will this approach protect my database from being modified? -


All I care about is not being changed in my database I do not have any login or stuff, so let me Keeping the matter in mind, I do not care about bypass, I do not want people to send commands like DROP through this simple HTML form.

Is this correct? After reading this another related topic, I have come here.

  $ stmt = $ dbh- & gt; Prepare ("INSERT Requested Request (IP, Messaging, Names, Oraas, Paintree, Song) VALUES (: IP ,: Message:: Name,: oras,: pentru ,: song)"); $ Stmt- & gt; Beyond Parm (': IP', $ IP); $ Stmt- & gt; Beyond Parm (': Messe', $ message); $ Stmt- & gt; Beyond Parm (': name', $ name); $ Stmt- & gt; Bundhparam (': Yara', $ yara); $ Stmt- & gt; Beyond Parm (': Paintru', $ Painter); $ Stmt- & gt; Beyond Parm (': Song', $ Melody); $ Stmt- & gt; Executed ();  

Will it fix any potential exploitation? Can any white hat confirm that it is safe?

You may be asking if you are asking this if your ready query code will prevent SQL injection attacks Yes, it is the work of SQL injection attacks, so yes, it is the work of SQL injection attacks, separating the query from the data with properly prepared / parameter queries, because sometimes the data is mixed with the eyes to get the command, so that no person will get your data Controlled through data input Can Su. Since they have separated in your case, this is not a problem.

Will it fix any potential exploitation?

No, and it will be impossible to answer as "yes" anyway It is a very comprehensive question that you still need to worry about all other threats of XSS attacks Do not forget about it and not in the rest of your application.


Comments

Popular posts from this blog

java - org.apache.http.ProtocolException: Target host is not specified -

java - Gradle dependencies: compile project by relative path -

ruby on rails - Object doesn't support #inspect when used with .include -