SELECT * FROM users WHERE username = 'admin' AND password = '' OR '1'='1';
<script>alert('XSS Attack');</script>
; rm -rf /
<img src="https://bank.com/transfer?amount=1000&to=attacker" />
function validateEmail(email) {
const regex = /^[^\s@]+@[^\s@]+\.[^\s@]+$/;
return regex.test(email);
}
const cleanHTML = DOMPurify.sanitize(userInput);
SELECT * FROM users WHERE username = ? AND password = ?;
db.query("SELECT * FROM users WHERE username = ? AND password = ?", [username, password]);
const allowedCountries = ["USA", "Canada", "Germany"];
if (allowedCountries.includes(userCountry)) {
// Разрешенное значение
} else {
// Запрещенное значение
}
const phoneRegex = /^\+?\d{10,15}$/;
if (phoneRegex.test(phoneNumber)) {
// Номер телефона корректен
}
$message = filter_var($_POST['message'], FILTER_SANITIZE_STRING);
$message = htmlentities($message, ENT_QUOTES, 'UTF-8');
import magic
mime_type = magic.from_file("file.jpg", mime=True)
if mime_type != "image/jpeg":
raise ValueError("Недопустимый тип файла")
$filename = uniqid() . "_" . $_FILES['file']['name'];
move_uploaded_file($_FILES['file']['tmp_name'], "uploads/" . $filename);