SQL Server injection -


Get new and no code in web development. To prevent SQL injection for SQL Server database, they have a function.

  The function is safe (val, max) slowed, word = array ("cast", "select", "varchar" , "Drop", ";", "insert", "delete", "xp_"), "I = 0 to val = left (val, maxsize) val = trim (val)", declare " Val = Substitution (Val, "'", "'"), makeafe = val end function  (Val, word (i), "e_" and val and "_e", vbTextCompare)  

The Hesitant to touch it, but is this missing anything?

The following article should help:

This path follows the string.Replace

Comments

Popular posts from this blog

mysql - BLOB/TEXT column 'value' used in key specification without a key length -

c# - Using Vici cool Storage with monodroid -

python - referencing a variable in another function? -