In message <mailman.867.1243574504.8015.python-l...@python.org>, Dennis Lee 
Bieber wrote:

> On Thu, 28 May 2009 20:57:13 +1200, Lawrence D'Oliveiro
> <l...@geek-central.gen.new_zealand> declaimed the following in
> gmane.comp.python.general:
> 
>>> 
>>>    >>> db.literal((... "%wildcard%" ...))
>>>    (... "'%wildcard%'" ...)
>> 
>> Doesn't look like it worked, does it?
> 
> If the problem is that you have /user/ input that may have a % sign
> that should NOT be treated as a wildcard, the solution is to train said
> user...

Sounds like a good solution to SQL-injection vulnerabilities, isn't it? 
Wonder why no-one thought of that before?

-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to