![]() |
is this code safe from sql injections?
I am new to coding vbulletin so I don't know the functions as such.
PHP Code:
|
Yes it is safe from SQL injections.
However, you will get a compile error as there is a missing comma after the first TYPE_STR. Furthermore, if you store data this way, you must make sure to run it through the parser or htmlspecialchars_uni() before displaying it - otherwise you open Cross Site Scripting (XSS) leaks. If you don't need raw data in the table, you can store HTML safe strings by using data verification type TYPE_NOHTML instead. |
I am getting a sql error
Here's the php PHP Code:
Code:
UPDATE testimonials SET |
The last comma (before WHERE) is wrong.
|
Wow I can't believe I missed that.
I think I'm done with the editing, do I give it to you to review or just re-upload the zip and send out an update? |
Just re-upload the zip and send out an update.
|
|
All times are GMT. The time now is 07:18 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|