diff options
| author | Rodrigo Prado <royopa@gmail.com> | 2019-04-20 23:53:02 -0300 |
|---|---|---|
| committer | Peter Kokot <peterkokot@gmail.com> | 2019-04-21 11:06:19 +0200 |
| commit | 80f3c69ae925b09068b0642306a8a14a42c7d25c (patch) | |
| tree | 01110ce282f31a1176e6b562633b6ea7958a8e21 /docs/input-filter.md | |
| parent | 47c5fa07102cebd3471074805a086d578c376d67 (diff) | |
| download | php-git-80f3c69ae925b09068b0642306a8a14a42c7d25c.tar.gz | |
Updated visual text elements using markdown
Diffstat (limited to 'docs/input-filter.md')
| -rw-r--r-- | docs/input-filter.md | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/docs/input-filter.md b/docs/input-filter.md index bca7f29ad2..c5307a2155 100644 --- a/docs/input-filter.md +++ b/docs/input-filter.md @@ -1,5 +1,4 @@ -Input Filter Support in PHP 5 ------------------------------ +# Input Filter Support in PHP 5 XSS (Cross Site Scripting) hacks are becoming more and more prevalent, and can be quite difficult to prevent. Whenever you accept user data @@ -21,6 +20,7 @@ $_POST, $_GET and $_COOKIE arrays are only populated with stripped data. In this simple example all I am doing is calling strip_tags() on the data. +``` ZEND_BEGIN_MODULE_GLOBALS(my_input_filter) zval *post_array; zval *get_array; @@ -180,3 +180,4 @@ PHP_FUNCTION(my_get_raw) RETVAL_FALSE; } } +``` |
