Additional Sql-injection functions and techniques for escaping;
[openemr.git] / interface / forms / misc_billing_options / report.php
blob8b5ee79010b0ff331203a4a9460cdf59d1d559a3
1 <?php
2 include_once("../../globals.php");
3 include_once($GLOBALS["srcdir"]."/api.inc");
4 function misc_billing_options_report( $pid, $encounter, $cols, $id) {
5 $count = 0;
6 $data = formFetch("form_misc_billing_options", $id);
7 if ($data) {
8 print "<table><tr>";
9 foreach($data as $key => $value) {
10 if ($key == "id" || $key == "pid" || $key == "user" || $key == "groupname" || $key == "authorized" || $key == "activity" || $key == "date" || $value == "" || $value == "0" || $value == "0000-00-00 00:00:00" || $value =="0000-00-00") {
11 continue;
13 if ($value == "1") {
14 $value = "yes";
17 $key=ucwords(str_replace("_"," ",$key));
18 print "<td><span class=bold>$key: </span><span class=text>$value</span></td>";
19 $count++;
20 if ($count == $cols) {
21 $count = 0;
22 print "</tr><tr>\n";
26 print "</tr></table>";
28 ?>