Geoff Caplan wrote:

Are the standard escaping functions found in the PHP, Tcl etc APIs to
Postgres bombproof? Are there any encodings that might slip through
and be cast to malicious strings inside Postgres? What about functions
like convert(): could they be used to slip something through the
escaping function?

What about writing nessus plugin(s) or a specific scanner for these escaping issues ? I don't know if a such thing already exists...

--
    Olivier

---------------------------(end of broadcast)---------------------------
TIP 7: don't forget to increase your free space map settings

Reply via email to