php - Do I have to sanitize user input with prepared SQL statements? -
Is it considered completely safe?
$ stmt = $ dbhandler-> Ready ("Set some time somefield = update: somestring"); $ Stmt- & gt; BindParam (": somestring", $ _ request ["hack_me_please"], PDO :: PARAM_STR); $ Stmt- & gt; Executed (); And if not, what can be safe with it? I am convinced that unknown weaknesses can be used in PDO / MySQL / PHP in the future, so I am thinking that if anybody is right, then I can secure my questions, or it can be done with my hands
If this is easy, then why is SQL injection still a thing? Will not it run in the way of polio?
No, cleaning is not required when using sql injection A statement ready to protect, but if you want for any other reason you can do this. If this is easy, then why is SQL injection still one thing? Will not it run in the way of polio?
It is easy for those who know about it, unless you know it, I believe that the sql injection There is not much nowadays.
Comments
Post a Comment