PHP prevents SQL injection
Release: 2016-07-25 08:44:22
Original
1110 people have browsed it
- /*
- Sometimes there is more than one variable submitted in the form, maybe a dozen or dozens. So is it a little troublesome to copy/paste addslashes() again and again? Since the data obtained from the form or URL appears in the form of an array, such as $_POST, $_GET), then customize a function that can "sweep the army"
- */
- function quotes($content)
- {
- //If magic_quotes_gpc=Off, then start processing
- if (!get_magic_quotes_gpc()) {
- //Determine whether $content is an array
- if (is_array($content)) {
- //If $content is an array, then Process each of its elements
- foreach ($content as $key=>$value) {
- $content[$key] = addslashes($value);
- }
- } else {
- //If $content is not an array , then it will only be processed once
- addslashes($content);
- }
- } else {
- //If magic_quotes_gpc=On, then it will not be processed
- }
- //Return $content
- return $content;
- }
- ?>
Copy code
|
php, SQL
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Articles by Author
-
2024-10-22 09:46:29
-
2024-10-13 13:53:41
-
2024-10-12 12:15:51
-
2024-10-11 22:47:31
-
2024-10-11 19:36:51
-
2024-10-11 15:50:41
-
2024-10-11 15:07:41
-
2024-10-11 14:21:21
-
2024-10-11 12:59:11
-
2024-10-11 12:17:31