Thanks for all of the help!
Thanks for all of the help and resources!
--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php
Hello,
on 02/21/2006 03:19 PM cKc Consultants said the following:
> An email form that uses a simple server side php code to send the variable
> values managed to send:
>
>
> Content-Type: multipart/alternative;
>> boundary=5c7c7e682d991e8ec1f6825582ea2103
>> MIME-Version: 1.0
>> Subject: round a
On 2/21/06, cKc Consultants <[EMAIL PROTECTED]> wrote:
An email form that uses a simple server side php code to send the variable
values managed to send:
Perhaps something here:
http://www.weberdev.com/AdvancedSearch.php?searchtype=title&search=%2Bemail+%2Bform&Submit1.x=0&Submit1.y=0
ted
On Tue, February 21, 2006 12:19 pm, cKc Consultants wrote:
> An email form that uses a simple server side php code to send the
> variable
> values managed to send:
Here is a stripped-down version of what happened:
YOUR BAD CODE:
Your Email:
Your Message:
Here is a crude script specifical
Good Resource
Greg Schnippel wrote:
On 2/21/06, cKc Consultants <[EMAIL PROTECTED]> wrote:
An email form that uses a simple server side php code to send the variable
values managed to send:
Try looking for articles on 'email injection'. This is a really good
place to start for a desc
On 2/21/06, cKc Consultants <[EMAIL PROTECTED]> wrote:
> An email form that uses a simple server side php code to send the variable
> values managed to send:
Try looking for articles on 'email injection'. This is a really good
place to start for a description of the security risk and ways to
patc
An email form that uses a simple server side php code to send the variable
values managed to send:
Content-Type: multipart/alternative;
> boundary=5c7c7e682d991e8ec1f6825582ea2103
> MIME-Version: 1.0
> Subject: round a rock by way of anchorage
> bcc: [EMAIL PROTECTED]
>
> This is a multi-part
7 matches
Mail list logo