CommonSpot question

2014-11-03 Thread Scott Stewart
Hey all, I know there's at least a couple of CommonSpot users on here, who might be able to answer a question.. :) Is there a way to restrict what a CommonSpot Authoring server pushes to the ROP servers? My government client is having an issue where a web.config file is getting pushed up to

cfqueryparam EncodeForHTML

2014-11-03 Thread Stephens, Larry V
Text input field Entry is Johnson Johnson's I store it in a table using cfqueryparam. All is good. Let's say the hacked entry is Johnson Johnson's;delete * (or something akin to that - you get the drift) I use cfqueryparam but it won't catch the hack; it's still just a string. At some

Re: Non-profit donation providers

2014-11-03 Thread Al Musella, DPM
I use paypal.. Couldn't be easier, and they give a discount on the rates to nonprofits... however, there is one big problem... Bad people have been using my donation form to test stolen credit cards. They use the stolen credit cards to make a small donation to see if the cards work. I

Using HighCharts.js with cfdocument

2014-11-03 Thread Dan Murphy
Does anyone have experience getting HighCharts.js to work with cfdocument? We would like to display the charts on printed reports or emails and are not sure if we should go the Phantom.js route that it (briefly) describes within the HighCharts.js documentation or if there are other options

Re: cfqueryparam EncodeForHTML

2014-11-03 Thread .jonah
Read up on how query param works. It will protect against Johnson Johnson's;delete * On 11/3/14, 12:41 PM, Stephens, Larry V wrote: Text input field Entry is Johnson Johnson's I store it in a table using cfqueryparam. All is good. Let's say the hacked entry is Johnson Johnson's;delete *

Re: cfqueryparam EncodeForHTML

2014-11-03 Thread Byron Mann
Larry, You are already using cfqueryparam so you are protected for the most part. I say most part, because you could still extract the data from the db and have bad consequences if you are not considerate of the underlying data and how you use it. Like querying malicious data and using it in