SQL_Injection issue exists @ admin/report-monthly.php in branch master
Method <?php at line 1 of admin\report-monthly.php gets user input from the _REQUEST element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method <?php at line 1 of admin\report-monthly.php. This may enable an SQL Injection attack.
SQL_Injection issue exists @ admin/report-monthly.php in branch master
Method <?php at line 1 of admin\report-monthly.php gets user input from the _REQUEST element. This element’s value then flows through the code without being properly sanitized or validated, and is eventually used in a database query in method <?php at line 1 of admin\report-monthly.php. This may enable an SQL Injection attack.
Severity: High
CWE:89
Checkmarx
Lines: 24 25
Code (Line #24):
Code (Line #25):