skip to main | skip to sidebar

Insert Something Creative

Tuesday, 9 January 2007

SQL Injection

SQL Prepared Statements are apparently not subject to injection attacks. The precompiled code will view the wildcard parameters as data only. Attempts to subvert the code proved futile, with no change to the database. Proper arguments work and the code executes.
Posted by Irregular Zero at 09:57

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2011 (3)
    • ►  November (2)
    • ►  February (1)
  • ►  2010 (3)
    • ►  April (2)
    • ►  March (1)
  • ►  2009 (5)
    • ►  August (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2008 (37)
    • ►  December (2)
    • ►  October (5)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (12)
    • ►  April (11)
    • ►  March (1)
    • ►  February (3)
  • ▼  2007 (36)
    • ►  September (2)
    • ►  August (8)
    • ►  July (2)
    • ►  June (7)
    • ►  April (2)
    • ►  February (4)
    • ▼  January (11)
      • Spring in Action
      • Native Hibernate vs. Hibernate JPA
      • HIbernate
      • Object Pool Pattern
      • Factory Method Pattern vs. Abstract Factory Pattern
      • MySQL Class
      • Abstract Factory Pattern for DAOExercise
      • DAOExercise Architecture
      • SQL Injection
      • JDBC Basics
      • SCJP Exam
  • ►  2006 (13)
    • ►  December (12)
    • ►  November (1)

Labels

  • apache (1)
  • database (3)
  • drupal (1)
  • google analytics (1)
  • groovy (1)
  • iphone (2)
  • kvm (2)
  • linux (2)
  • mail (1)
  • mongodb (2)
  • mysql (1)
  • port-forwarding (1)
  • postfix (1)
  • ubuntu (5)
  • vm-builder (1)