Is MySQL Query safe enough?!
I was thinking on some plugins here, and some i wrote for myself... Some nicknames in CS/HL can act like SQL Injection, or release some errors...
So, is that really safe to user SQL database statistics and other? As i see, in AMX is no function like "mysql_escape_string" or others. Mby there are other ways or AMX is just do that somehow in background?!! |
Re: Is MySQL Query safe enough?!
Safe, just use:
Code:
replace_all(str, 31, "`", "\`"); |
Re: Is MySQL Query safe enough?!
In a nick you can't have a " so you can do this instead:
PHP Code:
|
Re: Is MySQL Query safe enough?!
Actually:
Code:
SELECT * FROM someTable WHERE nick = '%s' |
Re: Is MySQL Query safe enough?!
Quote:
|
| All times are GMT -4. The time now is 01:26. |
Powered by vBulletin®
Copyright ©2000 - 2024, vBulletin Solutions, Inc.