I use mysql_real_escape_string() on my variables, but looking through my logs I noticed a stream of input from someone with entries like this:
${@print(md5(acunetix_wvs_security_test))}
1\" or (sleep(4)+1) limit 1 --
and so on. A huge list of them.
Is he just attempting and nothing happening? Or is my code not safe with just mysql_real_escape_string() ?
EDIT: I can't see any damage, but most of the input area's on the site have been attempted many many times. Wouldn't he have stopped if it didn't work once, realizing it was secure?
mysql_real_escape_stringis supposed to be used only for properly escaping strings to be used in MySQL strings.