Remove SQL injection vulnerabilities
Map each of the inputs from $_POST['ids'] into a separate, sanitized database input (via the db_input() function), then implode() the array with commas and build the SQL statement.
Showing
- include/class.team.php 3 additions, 1 deletioninclude/class.team.php
- scp/apikeys.php 4 additions, 2 deletionsscp/apikeys.php
- scp/banlist.php 8 additions, 4 deletionsscp/banlist.php
- scp/canned.php 4 additions, 2 deletionsscp/canned.php
- scp/categories.php 4 additions, 2 deletionsscp/categories.php
- scp/departments.php 7 additions, 3 deletionsscp/departments.php
- scp/emails.php 4 additions, 1 deletionscp/emails.php
- scp/filters.php 4 additions, 2 deletionsscp/filters.php
- scp/groups.php 4 additions, 2 deletionsscp/groups.php
- scp/helptopics.php 4 additions, 2 deletionsscp/helptopics.php
- scp/slas.php 4 additions, 2 deletionsscp/slas.php
- scp/staff.php 2 additions, 1 deletionscp/staff.php
- scp/syslogs.php 2 additions, 1 deletionscp/syslogs.php
- scp/teams.php 4 additions, 2 deletionsscp/teams.php
- scp/templates.php 2 additions, 1 deletionscp/templates.php
Please register or sign in to comment