diff --git a/test-15 b/test-15 new file mode 100644 index 0000000000..4bf37d167b --- /dev/null +++ b/test-15 @@ -0,0 +1,31 @@ +connect_error) { +die("Connection failed: " . $mysqli->connect_error); +} + +// Vulnerable query construction (DO NOT do this in a real application) +$query = "SELECT * FROM users WHERE username = '$user_input'"; + +// Execute the query (SQL injection vulnerability here) +$result = $mysqli->query($query); + +// Fetch and display results (not relevant for this example) +if ($result) { +while ($row = $result->fetch_assoc()) { +echo "Username: " . $row['username'] . "
"; +} +$result->close(); +} else { +echo "Query error: " . $mysqli->error; +} + +// Close the database connection +$mysqli->close(); +?>