Hardening the web-form to validate that the submission is a number, as well as converting the SQL query to a prepared statement preventing a SQL injection attack.
-
Updated
Mar 6, 2024 - JavaScript
Hardening the web-form to validate that the submission is a number, as well as converting the SQL query to a prepared statement preventing a SQL injection attack.
This repository includes Buffer Overflow, SQL Injection, Cross-Site Scripting, Cross-Site Request Factory Attacks implementations and Smart Contract Vulnerabilities
Add a description, image, and links to the sql-injection-attacks topic page so that developers can more easily learn about it.
To associate your repository with the sql-injection-attacks topic, visit your repo's landing page and select "manage topics."