in reply to Re^3: CGI-Upload / Bad File Number
in thread CGI-Upload / Bad File Number
This is security hole, anybody running your cgi can run any perl program they write eval("\$$_ = '$val';"); }
$cgi->param already gives you access to params by name, there is no need for eval
If you want something other than $cgi use a hash, see CGI->VarsAsHash
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^5: CGI-Upload / Bad File Number
by frnk (Novice) on Jul 17, 2016 at 05:59 UTC | |
by Anonymous Monk on Jul 17, 2016 at 08:26 UTC | |
by frnk (Novice) on Jul 17, 2016 at 12:29 UTC | |
by Anonymous Monk on Jul 17, 2016 at 21:11 UTC | |
by frnk (Novice) on Jul 18, 2016 at 10:50 UTC | |
|