zoukankan      html  css  js  c++  java
  • Asp防止sql 注入

    <%
    dim sql_injdata
    sql_injdata = "'|and|exec|insert|select|delete|update|count|*|%|chr|mid|master|truncate|char|declare|iframe|url=|href|<script>|</script>|<iframe>|</iframe>"
    sql_inj = split(sql_injdata,"|")
    if request.querystring<>"" then
     for each sql_get in request.querystring
      for sql_data=0 to ubound(sql_inj)
       if instr(request.querystring(sql_get),sql_inj(sql_data))>0 then
        response.write "<script language=javascript>alert('sql通用防注入系统提示↓请不要在参数中包含非法字符尝试注入!');history.back(-1)</script>"
        response.end
       end if
      next
     next
    end if
    if request.form<>"" then
     for each sql_post in request.form
      for sql_data=0 to ubound(sql_inj)
       if instr(request.form(sql_post),sql_inj(sql_data))>0 then
        response.write "<script language=javascript>alert('sql通用防注入系统提示↓请不要在参数中包含非法字符尝试注入!');history.back(-1)</script>"
        response.end
       end if
      next
     next
    end if
    %>
  • 相关阅读:
    标识符和关键字
    大任务拆成小任务,再到可并行的小任务
    莫等闲
    这样修改有哪些优缺点 wcf service via attribute setting vs config
    头脑发达,四肢简单
    32位还是64位
    session未释放
    split task
    sqlserver deadlock
    IronPython
  • 原文地址:https://www.cnblogs.com/kuyuecs/p/1368332.html
Copyright © 2011-2022 走看看