Hi Brad,
Your perfectly correct, I have changed the code to:
if ((isset($_POST["MM_update"])) && ($_POST["MM_update"] == "form1")) {
$updateSQL = sprintf("UPDATE FIDS_user_accounts SET PlusTimeArriveMidnight=%s WHERE member_id=" . $_POST['member_id'] . "",
GetSQLValueString($_POST['PlusTimeArriveMidnight'] = $_POST['plustimearrivemidnight'], "int"));
mysql_select_db($database_flightq, $flightq);
$Result1 = mysql_query($updateSQL, $flightq) or die(mysql_error());
header ("Location: editdisplay.php?member_id=" . $_POST['member_id']);
}
This does away GetSQLValueString($POST['member_id'] = $POST['member_id'], "int"));
As for SQL injection, all these scripts are not available to normal web surfers, they sit in a protected area with strong passwords.
Thanks for your input which is always very welcome.