Web Monitoring

Login: Password:
slider

XSS and SQLi Scanner

Online XSS and SQLi Scanner for PHP projects
slider

Find Monitoring

Website monitoring, shell detector
slider

HTML Validator

Simple HTML Validator, only unclosed tags will be checked
slider

Find XSS Fire

Add-on for Firefox, vulnerability scanner

Test for SQL injection



1/1 Choice the true answer:

mysql_query("SELECT * FROM users WHERE user_id = '".mysql_real_escape_string($_GET['id'])."'");
mysql_query("SELECT * FROM users WHERE user_id = '$_GET[id]'");
mysql_query("SELECT * FROM users WHERE user_id = ".floatval($_GET['id']));
mysql_query("SELECT * FROM users WHERE user_id = ".htmlentities($_GET['id']));
mysql_query("SELECT * FROM users WHERE user_id = ".trim($_GET['id']));
mysql_query("SELECT * FROM users WHERE user_id = '".((int) $_GET['id'])."'");
mysql_query("SELECT * FROM users WHERE user_id = ".$_GET['id']);
mysql_query("SELECT * FROM users WHERE user_id = {$_GET[id]}");
mysql_query("SELECT * FROM users WHERE user_id = ".intval($_GET['id']));
mysql_query("SELECT * FROM users WHERE user_id = ".mysql_real_escape_string($_GET['id']));


Copyright © 2010 - 2017 Find-XSS.net
0.025913000106812