Changes between Initial Version and Version 1 of Ticket #10
- Timestamp:
- Nov 25, 2023, 6:42:33 PM (17 months ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Ticket #10
- Property Milestone → Maintenance and Security
- Property Type defect → task
-
Ticket #10 – Description
initial v1 1 Find an Replace Possible QL Injection Vulnerabilities. Use bind parameters with sqlalchemy.sql.expression.text to avoid SQL injection.1 Find an Replace Possible SQL Injection Vulnerabilities. Use bind parameters with sqlalchemy.sql.expression.text to avoid SQL injection. 2 2 3 3 Also look at using the sql/core layer to build queries should also work of course, ie. session.execute(select(my_table).where(id=some_id)).