-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feat: Avoiding SQL injections using prepared statements of MySQLi (Open for contribution) #30
Comments
More than 1 can work on this issue and collaborate across files to implement this |
@aswinikalyan30 please assign this issue to me....i would love to work on this . |
Hey @anushkasaxena07 , there are a lot of queries to be modified and need to ensure everything is working after the changes |
i have to make changes just in admin_class.php file or in others too ? @aswinikalyan30 |
There are direct SQL queries injection in many files, let this issue be only for the admin_class file. Will open another one for the others |
i would like to work on this project, please assign this to me |
Describe the feature
In the current implementation , we are directly passing the POST data with session variables into the query string which can expose the application to SQL injection. Re-factor the SQL statements in admin_class.php file to mitigate this.
Add ScreenShots
Refactor items like these into:
Prepared statements like these:
Record
The text was updated successfully, but these errors were encountered: