Displaying 7 results from an estimated 7 matches for "mysql_real_escape_string".
2016 Mar 24
2
C5 MySQL injection attack ("Union Select")
...45,120,49,56,45,81,45),CHAR(45,120,49,57,45,81,45),CHAR(45,120,50,48,45,81,45),CHAR(45,120,50,49,45,81,45),CHAR(45,120,50,50,45,81,45),CHAR(45,120,50,51,45,81,45) -- /*
and reject any incoming string containing ' or " in addition to PHP's
strip_tags and (deprecated in later versions)
mysql_real_escape_string($_GET['....'],$link);
I do not use Wordpress or anything like it.
--
Regards,
Paul.
England, EU. England's place is in the European Union.
2016 Mar 24
1
C5 MySQL injection attack ("Union Select")
...> > I should have imposed strict controls on the length of
> > parameters passed to programmes via web pages $_GET[] such as...
> > and reject any incoming string containing ' or " in addition to PHP's
> > strip_tags and (deprecated in later versions)
> > mysql_real_escape_string($_GET['....'],$link);
>
> No. No. Nooooooooo.
>
> You're missing the point that everyone is trying to communicate to you.
> Do not use string concatenation. Do not use sprintf. Do not use
> mysql_real_escape_string().
I have never (not once) used non-prepared...
2007 May 23
0
Problems compiling res_config_mysql (asterisk addons)
..._mysql.c:100: undefined
reference to `ast_log'
res_config_mysql.o(.text+0xb5):/usr/local/src/asterisk-addons-1.4.1/res_config_mysql.c:108:
undefined reference to `ast_log'
res_config_mysql.o(.text+0x181):/usr/local/src/asterisk-addons-1.4.1/res_config_mysql.c:126:
undefined reference to `mysql_real_escape_string'
res_config_mysql.o(.text+0x257):/usr/local/src/asterisk-addons-1.4.1/res_config_mysql.c:133:
undefined reference to `mysql_real_escape_string'
res_config_mysql.o(.text+0x2e4):/usr/local/src/asterisk-addons-1.4.1/res_config_mysql.c:138:
undefined reference to `ast_log'
res_config_mysq...
2016 Mar 24
0
C5 MySQL injection attack ("Union Select")
...M, Always Learning wrote:
> I should have imposed strict controls on the length of
> parameters passed to programmes via web pages $_GET[] such as...
> and reject any incoming string containing ' or " in addition to PHP's
> strip_tags and (deprecated in later versions)
> mysql_real_escape_string($_GET['....'],$link);
No. No. Nooooooooo.
You're missing the point that everyone is trying to communicate to you.
Do not use string concatenation. Do not use sprintf. Do not use
mysql_real_escape_string().
Use prepared statements.
http://php.net/manual/en/mysqli.quickstart.pre...
2004 Aug 18
0
SIP/IAX2 mysql auth + FreeBSD
...ying to do this :
http://www.voip-info.org/tiki-index.php?page=Asterisk%20sip%20mysql%20peers
on a FreeBSD (4.9-RELEASE-p11) with mysql 3.23.58 (from the ports)
but the only thing i'm getting is :
Aug 18 20:22:27 WARNING[135151616]: /usr/lib/asterisk/modules/chan_sip.so: Undefined symbol "mysql_real_escape_string"
Aug 18 20:22:27 WARNING[135151616]: Loading module chan_sip.so failed!
The Mysql libs seems to be running correctly (cdr_addon_mysql.so is
working).
I'd really don't know where to begin my search...
Maybe someone can help ?
Cheers
r1
2010 Nov 26
1
R Tools & Vista_x64: Problem compiling RMySQL?
...MySQL.c:(.text+0x23fd): undefined reference to `mysql_errno'
RS-MySQL.o:RS-MySQL.c:(.text+0x252a): undefined reference to
`mysql_fetch_lengths'
RS-MySQL.o:RS-MySQL.c:(.text+0x28fd): undefined reference to
`mysql_insert_id'
RS-MySQL.o:RS-MySQL.c:(.text+0x29cd): undefined reference to
`mysql_real_escape_string'
RS-MySQL.o:RS-MySQL.c:(.text+0x2a7a): undefined reference to
`mysql_get_client_info'
RS-MySQL.o:RS-MySQL.c:(.text+0x2ab8): undefined reference to
`mysql_get_client_version'
RS-MySQL.o:RS-MySQL.c:(.text+0x2afc): undefined reference to
`mysql_server_init'
RS-MySQL.o:RS-MySQL.c:(.t...
2016 Mar 24
10
C5 MySQL injection attack ("Union Select")
mysql Ver 14.12 Distrib 5.0.95, for redhat-linux-gnu (x86_64) using
readline 5.1
I spotted something strange and immediately installed a routine to
automatically impose an iptables block when the key used for database
access is excessively long.
My URL was something like this
...../...../.....php?key=123456
The injection was something like this