Changes between Initial Version and Version 1 of Ticket #10


Ignore:
Timestamp:
Nov 25, 2023, 6:42:33 PM (17 months ago)
Author:
me egan
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #10

    • Property MilestoneMaintenance and Security
    • Property Type defecttask
  • Ticket #10 – Description

    initial v1  
    1 Find an Replace Possible QL Injection Vulnerabilities. Use bind parameters with sqlalchemy.sql.expression.text to avoid SQL injection.
     1Find an Replace Possible SQL Injection Vulnerabilities. Use bind parameters with sqlalchemy.sql.expression.text to avoid SQL injection.
    22
    33Also look at using the sql/core layer to build queries should also work of course, ie. session.execute(select(my_table).where(id=some_id)).