-
Bertold von Dormilich authored
Replaced the code examples for `set()` to show that the value parameter is not escaped and thus could pose an SQL injection vulnerability.
68990405
Replaced the code examples for `set()` to show that the value parameter is not escaped and thus could pose an SQL injection vulnerability.
Name |
Last commit
|
Last update |
---|---|---|
bin | Loading commit data... | |
docs | Loading commit data... | |
lib/Doctrine/DBAL | Loading commit data... | |
tests | Loading commit data... | |
.gitattributes | Loading commit data... | |
.gitignore | Loading commit data... | |
.gitmodules | Loading commit data... | |
.scrutinizer.yml | Loading commit data... | |
.travis.yml | Loading commit data... | |
LICENSE | Loading commit data... | |
README.md | Loading commit data... | |
SECURITY.md | Loading commit data... | |
UPGRADE.md | Loading commit data... | |
build.properties | Loading commit data... | |
build.xml | Loading commit data... | |
composer.json | Loading commit data... | |
phpunit.xml.dist | Loading commit data... | |
run-all.sh | Loading commit data... |