Web Open Patch: Filter values to prevent security exploits

Recommend this page to a friend!
  Info   View files View files (7)   DownloadInstall with Composer Download .zip   Reputation   Support forum   Blog    
Ratings Unique User Downloads Download Rankings
Not yet rated by the usersTotal: 968 This week: 1All time: 3,700 This week: 196Up
Version License PHP version Categories
wop 1.0GNU General Publi...5.0PHP 5, Validation, Security
Description Author

This class can be used to filter values to prevent security exploits.

It can filter values in several ways to avoid values that could be used to perform security attacks.

Currently it can filter values to prevent MySQL SQL injections, injection of e-mail messages in headers, escaping values to prevent cross-site scripting, generate and validate tokens to prevent cross-site request forgery attacks.

Picture of Marcos Bezerra
Name: Marcos Bezerra <contact>
Classes: 2 packages by
Country: Brazil Brazil
Age: 51
All time rank: 147998 in Brazil Brazil
Week rank: 184 Up12 in Brazil Brazil Up

 

  Files folder image Files  
File Role Description
Accessible without login Plain text file ex1.php Example Example #1: Anti-SQL Injection
Accessible without login Plain text file ex2.php Example Example #2: Anti-SQL Injection Alternative
Accessible without login Plain text file ex3.php Example Example #3: Anti-SQL Injection and Mail Injection Combined
Accessible without login Plain text file ex4.php Example Example #4: Anti-XSS Injection
Accessible without login Plain text file ex5.php Example Example #5: Anti-Remote Code Injection
Accessible without login Plain text file ex6.php Example Example #6: Anti-XSRF Injection
Plain text file WebOpenPatch.php Class Main Class

 Version Control Unique User Downloads Download Rankings  
 0%
Total:968
This week:1
All time:3,700
This week:196Up

For more information send a message to info at phpclasses dot org.