in reply to Re^2: limiting scope of 'eval'??
in thread limiting scope of 'eval'??
I note a security implication here; you may have it covered.
Can flatfile be edited to include:
Kaboom! <% system(rm *) %>
or other (possibly inadvertent) malicious code?
Will index.pl run this code?
Regards,
PN5
|
|---|