Hello,
on 02/21/2006 03:19 PM cKc Consultants said the following:
An email form that uses a simple server side php code to send the variable
values managed to send:
Content-Type: multipart/alternative;
boundary=5c7c7e682d991e8ec1f6825582ea2103
MIME-Version: 1.0
Subject: round a rock by
Thanks for all of the help!
Thanks for all of the help and resources!
--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php
An email form that uses a simple server side php code to send the variable
values managed to send:
Content-Type: multipart/alternative;
boundary=5c7c7e682d991e8ec1f6825582ea2103
MIME-Version: 1.0
Subject: round a rock by way of anchorage
bcc: [EMAIL PROTECTED]
This is a multi-part
On 2/21/06, cKc Consultants [EMAIL PROTECTED] wrote:
An email form that uses a simple server side php code to send the variable
values managed to send:
snip
Try looking for articles on 'email injection'. This is a really good
place to start for a description of the security risk and ways to
Good Resource
Greg Schnippel wrote:
On 2/21/06, cKc Consultants [EMAIL PROTECTED] wrote:
An email form that uses a simple server side php code to send the variable
values managed to send:
snip
Try looking for articles on 'email injection'. This is a really good
place to start for a
On Tue, February 21, 2006 12:19 pm, cKc Consultants wrote:
An email form that uses a simple server side php code to send the
variable
values managed to send:
Here is a stripped-down version of what happened:
YOUR BAD CODE:
?php if (isset($email)){
//This next line blindly embeds the user
On 2/21/06, cKc Consultants [EMAIL PROTECTED] wrote:
An email form that uses a simple server side php code to send the variable
values managed to send:
snip
Perhaps something here:
http://www.weberdev.com/AdvancedSearch.php?searchtype=titlesearch=%2Bemail+%2BformSubmit1.x=0Submit1.y=0
7 matches
Mail list logo