my $sth = $dbh->prepare('SELECT * FROM foo WHERE bar = ?'); $sth->execute($baz)
that someone could pass in unfortunate extra bits in $baz like, for instance, '; DROP TABLE big_important_one' on the back of that parameter (in the same way as with opening files you can pass '; rm -rf *')?
In reply to DBI Parameter Security by pileswasp
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |