Download the PHP package andrewbreksa/mysql-escape-string-polyfill without Composer
On this page you can find all versions of the php package andrewbreksa/mysql-escape-string-polyfill. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Table of contents
Download andrewbreksa/mysql-escape-string-polyfill
More information about andrewbreksa/mysql-escape-string-polyfill
Files in andrewbreksa/mysql-escape-string-polyfill
Download andrewbreksa/mysql-escape-string-polyfill
More information about andrewbreksa/mysql-escape-string-polyfill
Files in andrewbreksa/mysql-escape-string-polyfill
Vendor andrewbreksa
Package mysql-escape-string-polyfill
Short Description mysql-escape-string-polyfill is a very insecure `mysql_escape_string` implementation (PHP 7.1/7.2) for a very limited use case
License MIT
Package mysql-escape-string-polyfill
Short Description mysql-escape-string-polyfill is a very insecure `mysql_escape_string` implementation (PHP 7.1/7.2) for a very limited use case
License MIT
Please rate this library. Is it a good library?
Informations about the package mysql-escape-string-polyfill
mysql-escape-string-polyfill
mysql-escape-string-polyfill is a very insecure mysql_escape_string
implementation (PHP 7.1/7.2) for a very limited use case
Usage
- Install this package via composer:
composer require andrewbreksa/mysql-escape-string-polyfill
- Find all the places you use the
mysql_*
functions, and refactor your code to use PDO
Limitations
-
Uses the following map to replace characters in a string:
- Not very comprehensively tested, this will be an ongoing effort as new edge cases are discovered
Hacking on the complex source code
The implementation can be found in functions.php, and you can run tests by executing composer test
All versions of mysql-escape-string-polyfill with dependencies
PHP Build Version
Package Version
Requires
php Version
^7.1|^7.2
The package andrewbreksa/mysql-escape-string-polyfill contains the following files
Loading the files please wait ....