Problem Solving skill - the wrong way around
A friend just sent me this:
You would think that people who are aware of sql injection would understand about parameterized queries!
A friend just sent me this:
You would think that people who are aware of sql injection would understand about parameterized queries!
And 4 more posts are pending...
There are posts all the way to Feb 17, 2025
Comments
I've seen similar to this in production, though it was with classic ASP... SQL injection is still a huge problem.
Yeah, and this kludge introduces other problems, such as screwing up any input that contained words like "teardrop" or "selection" etc :)
Wow I love that one a lot, Drop table Users... thats way too cool.
I wonder why people don't just dedicate the protection to ADO itself... with a Command object you are safe enough. Work around the nameless parameter is probably easier then fixing it.
Another way around is definitely stop the execution as long as you saw those keywords. Or, hey.... time for some Regular Expression practice... thats more precise.
Comment preview