sqlmap: 0.6.1 released


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News sqlmap: 0.6.1 released
# 1  
Old 10-29-2008
sqlmap: 0.6.1 released

sqlmap is an automatic SQL injection tool. Once it detects a SQL injection on the target host you can perform an extensive back-end DBMS fingerprint, enumerate users, password hashes, privileges, databases, dump DBMS tables/columns and much more.
ImageImage

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
PG_UPDATE(3)															      PG_UPDATE(3)

pg_update - Update table

SYNOPSIS
mixed pg_update (resource $connection, string $table_name, array $data, array $condition, [int $options = PGSQL_DML_EXEC]) DESCRIPTION
pg_update(3) updates records that matches condition with data. If options is specified, pg_convert(3) is applied to data with specified options. PARAMETERS
o $connection - PostgreSQL database connection resource. o $table_name - Name of the table into which to update rows. o $data - An array whose keys are field names in the table $table_name, and whose values are what matched rows are to be updated to. o $condition - An array whose keys are field names in the table $table_name, and whose values are the conditions that a row must meet to be updated. o $options - Any number of PGSQL_CONV_FORCE_NULL, PGSQL_DML_NO_CONV, PGSQL_DML_ESCAPE, PGSQL_DML_EXEC, PGSQL_DML_ASYNC or PGSQL_DML_STRING combined. If PGSQL_DML_STRING is part of the $options then query string is returned. When PGSQL_DML_NO_CONV or PGSQL_DML_ESCAPE is set, it does not call pg_convert(3) internally. RETURN VALUES
Returns TRUE on success or FALSE on failure. Returns string if PGSQL_DML_STRING is passed via $options. EXAMPLES
Example #1 pg_update(3) example <?php $db = pg_connect('dbname=foo'); $data = array('field1'=>'AA', 'field2'=>'BB'); // This is safe, since $_POST is converted automatically $res = pg_update($db, 'post_log', $_POST, $data); if ($res) { echo "Data is updated: $res "; } else { echo "User must have sent wrong inputs "; } ?> CHANGELOG
+-------------+---------------------------------------------------+ | Version | | | | | | | Description | | | | +-------------+---------------------------------------------------+ | 5.6.0 | | | | | | | No longer experimental. Added PGSQL_DML_ESCAPE | | | constant, TRUE/ FALSE and NULL data type support. | | | | |5.5.3/5.4.19 | | | | | | | Direct SQL injection to $table_name and Indirect | | | SQL injection to identifiers are fixed. | | | | +-------------+---------------------------------------------------+ SEE ALSO
pg_convert(3). PHP Documentation Group PG_UPDATE(3)