Hey all,
I know there's at least a couple of CommonSpot users on here, who might be
able to answer a question.. :)
Is there a way to restrict what a CommonSpot Authoring server pushes to the
ROP servers?
My government client is having an issue where a web.config file is getting
pushed up to
Text input field
Entry is Johnson Johnson's
I store it in a table using cfqueryparam. All is good.
Let's say the hacked entry is Johnson Johnson's;delete * (or something akin
to that - you get the drift) I use cfqueryparam but it won't catch the hack;
it's still just a string.
At some
I use paypal.. Couldn't be easier, and they give a discount on the
rates to nonprofits...
however, there is one big problem...
Bad people have been using my donation form to test stolen credit
cards. They use the stolen credit cards to make a small donation to
see if the cards work. I
Does anyone have experience getting HighCharts.js to work with cfdocument? We
would like to display the charts on printed reports or emails and are not sure
if we should go the Phantom.js route that it (briefly) describes within the
HighCharts.js documentation or if there are other options
Read up on how query param works. It will protect against Johnson
Johnson's;delete *
On 11/3/14, 12:41 PM, Stephens, Larry V wrote:
Text input field
Entry is Johnson Johnson's
I store it in a table using cfqueryparam. All is good.
Let's say the hacked entry is Johnson Johnson's;delete *
Larry,
You are already using cfqueryparam so you are protected for the most
part. I say most part, because you could still extract the data from the db
and have bad consequences if you are not considerate of the underlying data
and how you use it. Like querying malicious data and using it in
6 matches
Mail list logo