<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ratm+owasp</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ratm+owasp"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ratm_owasp"/>
		<updated>2026-04-23T23:34:29Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Code_Injection&amp;diff=34117</id>
		<title>Talk:Code Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Code_Injection&amp;diff=34117"/>
				<updated>2008-07-15T08:26:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ratm owasp: New page: Is the php code injection example correct? I gave it more than one try on the php command line, and it doesn't seem to work. I think that this code snippet eval(&amp;quot;\$myvar = \$x;&amp;quot;);  is not ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Is the php code injection example correct? I gave it more than one try on the php command line, and it doesn't seem to work.&lt;br /&gt;
I think that this code snippet&lt;br /&gt;
eval(&amp;quot;\$myvar = \$x;&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
is not exploitable, since the string that is evaluated is a constant. It works like a charm if you don't escape $x.&lt;/div&gt;</summary>
		<author><name>Ratm owasp</name></author>	</entry>

	</feed>