#28770: Warn that quoting a placeholder in a raw SQL string can lead to SQL
injection
--------------------------------------+------------------------------------
     Reporter:  Hynek Cernoch         |                    Owner:  nobody
         Type:  Cleanup/optimization  |                   Status:  closed
    Component:  Documentation         |                  Version:  master
     Severity:  Normal                |               Resolution:  fixed
     Keywords:                        |             Triage Stage:  Accepted
    Has patch:  1                     |      Needs documentation:  0
  Needs tests:  0                     |  Patch needs improvement:  0
Easy pickings:  0                     |                    UI/UX:  0
--------------------------------------+------------------------------------
Changes (by GitHub <noreply@…>):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 In [changeset:"327f0f37ce3c1e5ac3a19668add237ddd92266d6" 327f0f3]:
 {{{
 #!CommitTicketReference repository=""
 revision="327f0f37ce3c1e5ac3a19668add237ddd92266d6"
 Fixed #28770 -- Warned that quoting a placeholder in a raw SQL string is
 unsafe.

 Thanks Hynek Cernoch for the report and review.
 }}}

-- 
Ticket URL: <https://code.djangoproject.com/ticket/28770#comment:2>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-updates+unsubscr...@googlegroups.com.
To post to this group, send email to django-updates@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/066.385159e64d67f9a4801b40aa179f3f0d%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to