You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
client.db.query(`UPDATE server SET prefix = '${args[1]}' WHERE serverID = '${message.guildID}'`)
By passing raw values into your SQL statements, people can perform SQL injections easily.
You need to escape the input or use parameters as in the examples below.
client.db.query(`UPDATE server SET prefix = ? WHERE serverID = '${message.guildID}'`,[args[1]])client.db.query(`UPDATE server SET prefix = '${client.db.escape(args[1])}' WHERE serverID = '${message.guildID}'`)
The text was updated successfully, but these errors were encountered:
Vulnerable code is on the following line:
Aroah_Security_Bot_Discord/commands/config/editprefix.js
Line 44 in c737dd5
By passing raw values into your SQL statements, people can perform SQL injections easily.
You need to escape the input or use parameters as in the examples below.
The text was updated successfully, but these errors were encountered: