Err... did someone just try an SQL injection attack on the bugzilla?

On 15/01/11 18:00, [email protected] wrote:
http://www.w3.org/Bugs/Public/show_bug.cgi?id=11770

            Summary: test tx.executeSql("SELECT COUNT(*) FROM ToDo", [],
                     function(result){}, function(tx, error){});
                     tx.executeSql("SELECT COUNT(*) FROM ToDo", [],
                     function(result){}, function(tx, error){});
                     tx.executeSql("SELECT COUNT(*) FROM ToDo", [],
                     function(result){},
            Product: WebAppsWG
            Version: unspecified
           Platform: Other
                URL: http://www.whatwg.org/specs/web-apps/current-work/#top
         OS/Version: other
             Status: NEW
           Severity: normal
           Priority: P3
          Component: WebSocket API (editor: Ian Hickson)
         AssignedTo: [email protected]
         ReportedBy: [email protected]
          QAContact: [email protected]
                 CC: [email protected], [email protected]


Specification: http://dev.w3.org/html5/websockets/
Section: http://www.whatwg.org/specs/web-apps/current-work/complete.html#top

Comment:
test tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){},
function(tx, error){});

tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){},
function(tx, error){});

tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){},
function(tx, error){});


Posted from: 61.145.79.212



Reply via email to