TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

PHP 'magic_quotes_gpc' Directive Security Bypass Weakness

5 点作者 hm2k超过 13 年前

1 comment

pilif超过 13 年前
while I agree that a feature not working as intended is a bad thing, magic_quotes_gpc also is a very, very bad idea, is deprecated for years and is going to be gone from PHP 5.4.<p>Also, it never worked right ever since PHP supported more than just MySQL and mSQL (and even for these databases it doesn't work any more, especially since the advent of Unicode)<p>In fact, it works so badly that projects usually go out of their way to turn this mis-feature off or work around it before even looking at input data.<p>As such, I really think this is not newsworthy enough because applications still relying on this mis-feature already have different issues anyways (and are likely not running on hosts that can/want to update PHP)