Hi.
I have been working on a script for a couple of years, it has heavy use.
I started work on some major changes locally and noticed a huge SQL injection vulnrability - however it doesnt work on the 'real' site.
It looks like all $POST and $GET variables are automatically slashed. Whereas on my home PC, they arent.
The only difference is that the main server is using IIS, whereas I have Apache.
Could someone give me a little more info on what is going on?
Also, how could I check if something is slashed, before slashing it myself? Just in case the webhosts change settings or something without me knowing?
Thank you!!