Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

{keyword};select Pg_sleep(5)-- Apr 2026

: Strict allow-listing for expected formats (e.g., ensuring a "keyword" only contains alphanumeric characters).

A PostgreSQL function that pauses the current session for exactly 5 seconds. --

The SQL comment syntax used to ignore the rest of the original, legitimate query so it doesn't cause a syntax error. 🛠️ Secure Implementation Example (Node.js/pg) {KEYWORD};SELECT PG_SLEEP(5)--

// UNSAFE: Vulnerable to the injection provided const query = "SELECT * FROM articles WHERE topic = '" + userInput + "'"; // SAFE: Parameterized query const query = "SELECT * FROM articles WHERE topic = $1"; const values = [userInput]; db.query(query, values, (err, res) => { // The database treats $1 strictly as data, even if it contains "SELECT PG_SLEEP(5)" }); Use code with caution. Copied to clipboard

Likely the intended legitimate input for a search or filter feature. ; : Strict allow-listing for expected formats (e

The input provided ( SELECT PG_SLEEP(5)-- ) is a classic payload used to test for vulnerabilities in PostgreSQL databases.

The statement separator used to "stack" a new command after the first one. SELECT PG_SLEEP(5) 🛠️ Secure Implementation Example (Node

For comprehensive testing and prevention guidelines, refer to the OWASP SQL Injection Prevention Cheat Sheet . SQL Injection Cheat Sheet - Invicti