-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding vuln sqlquery #1
base: master
Are you sure you want to change the base?
Conversation
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
1 similar comment
SonarCloud Quality Gate failed.
|
SonarCloud Quality Gate failed.
|
Kudos, SonarCloud Quality Gate passed!
|
SonarCloud Quality Gate failed.
|
|
{ | ||
$userId = $request->get('id'); | ||
$sql = "SELECT email FROM user WHERE id='$userId'"; | ||
$statement = $this->connection->prepare($sql); |
Check failure
Code scanning / SonarCloudsquad-3
Database queries should not be vulnerable to injection attacks
{ | ||
$userId = $request->get('name'); | ||
$sql = "SELECT username FROM user WHERE id='$userId'"; | ||
$statement = $this->connection->prepare($sql); |
Check failure
Code scanning / SonarCloudsquad-3
Database queries should not be vulnerable to injection attacks
|
{ | ||
$userId = $request->get('id'); | ||
$sql = "SELECT email FROM user WHERE id='$userId'"; | ||
$statement = $this->connection->prepare($sql); |
Check failure
Code scanning / SonarCloudStaging
Database queries should not be vulnerable to injection attacks High
{ | ||
$userId = $request->get('name'); | ||
$sql = "SELECT username FROM user WHERE id='$userId'"; | ||
$statement = $this->connection->prepare($sql); |
Check failure
Code scanning / SonarCloudStaging
Database queries should not be vulnerable to injection attacks High
|
{ | ||
$userId = $request->get('id'); | ||
$sql = "SELECT email FROM user WHERE id='$userId'"; | ||
$statement = $this->connection->prepare($sql); |
Check failure
Code scanning / SonarCloudDev
Database queries should not be vulnerable to injection attacks High
{ | ||
$userId = $request->get('name'); | ||
$sql = "SELECT username FROM user WHERE id='$userId'"; | ||
$statement = $this->connection->prepare($sql); |
Check failure
Code scanning / SonarCloudDev
Database queries should not be vulnerable to injection attacks High
|
1 similar comment
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 similar comment
|
No description provided.