Do NOT use the information provided on the target page of the above poster's link.
dlhylton;10999302 wrote:To retrieve information from a radio button in PHP, check out this link:
It suggests that you take input and use it without any kind of sanitizing, which means that the end user could send
<script>// This is an xss attack...</script>
which ends up in $_POST['whatever'], which is then echoed to screen. If this is only ever echoed back once to the user posting it, the risk is not as high as if you'd also store the script element and its content and displayed it to anyone viewing the page (for example if this was a comment on a blog or news article).
However, it's still possible to use this weakness by means of tricking an unwary poster into posting this himself.
Regardless of risk, you never ever use any kind of input without properly sanitizing it, which was the point weedpacket tried to make earlier on. And just beause you need different techniques to make something safe for use in db queries and to display them in an HTML page doesn't mean that you can ignore one or the other.