Alle 11:18, giovedì 14 agosto 2003, moshe doron ha scritto:
> > How about a form of dos:
> >
> > '...where id = '.$id
> >
> > with $id = '23129 or 1'
> >
> > this will select all entries in the table which could result in
> > DoS...
> >
> > So, ultimately this problem is the coders responsibility.
>
> DoS are not equivalent to droping the whole database (in the fast and
> soft case...).
> most of the system allowing searches, can be DoSed easily.

<joke>
Why not stopping support for <form>s then? Drop $_GET, $_POST and 
$_REQUEST! They're EVIL!
That way everyone is *really* safe from sql injection.... :-)
</joke>

-- 
Cesare D'Amico - theboss (at) cesaredamico (dot) com
http://www.verona.linux.it - http://www.ziobudda.net
.."Questa e` la mia vita, se ho bisogno te lo dico
   Sono io che guido, io che vado fuori strada, sempre io che pago,
   non e` mai successo che pagassero per me..." [Ligabue]
.."Ma chi cazzo ho comprato????" - [Moratti, tutte le estati]

--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to