SQL Server injection -
Get new and no code in web development. To prevent SQL injection for SQL Server database, they have a function.
The function is safe (val, max) slowed, word = array ("cast", "select", "varchar" , "Drop", ";", "insert", "delete", "xp_"), "I = 0 to val = left (val, maxsize) val = trim (val)", declare " Val = Substitution (Val, "'", "'"), makeafe = val end function (Val, word (i), "e_" and val and "_e", vbTextCompare) The Hesitant to touch it, but is this missing anything?
The following article should help:
This path follows the string.Replace
Comments
Post a Comment