do you use notepad++? i couldnt live without it. well, i could, but its better then nothing.
http://notepad-plus-plus.org/ now, first thing i noticed when i copy/pasted the code, was this: doesnt look like this:
$_SESSION[username]
$_SESSION["username"]
by that i mean yours is quoteless. and not only that, this: doesnt look like this:
".$_POST["1_2012"]."
'".$_POST["1_2012"]."'
by that i mean, the POST, IS the query. the same with the username, its not wrapped in quotes when the sql string is sent to the database. you dont have any `` wrapped around your table names either, but thats only important if your table name was a sql function, like if a table was named set. it would need to be written as `set`. but anyway, i also noticed that you are using a mysql thing. most of those functions are not going to be in future php becuz its easy to hack, so no one is going to use it anyway. a example was what i just said, the POST IS the query. you have to use prepared statements, you can get some information on what it looks like here, sort of ish:
http://stackoverflow.com/questions/11112738/php-pdo-for-dummies
if your going to update database stuff, you need something like this first:
$DATA = new PDO('mysql:dbname=DATABASE_NAME;host=YOUR_WEBSITE_THING;charset=utf8','DATABASE_USERNAME','DATABASE_PASSWORD');
$DATA -> setAttribute(PDO::ATTR_EMULATE_PREPARES,false);
$DATA -> setAttribute(PDO::ATTR_ERRMODE,PDO::ERRMODE_EXCEPTION);
now, $DATA is pretty much your database. thats all you need to know really. i dont even know what that is either, i copy/pasted it from someone else and thats why i have it like that. btw i mean i use this, i copy/pasted this one from my stuff. now to update the database properly, you need something like this:
$DATA -> prepare( "UPDATE `coins` SET `1_2012` = :coins WHERE id = :username" ) -> execute( ':username' => $_SESSION['username'], ':coins' => $_POST['1_2012'] );
if you dont get this, pretty much all whats happening is that :coins & :username will get replaced with the array ones inside of execute(). yes, the stuff inside is just an array. the point of this is so that if POST was like, idk a hack, it shouldnt work, like evar. it also means you dont have to filter it. but of course, you need to filter it if it leaves the database, in case it had like, java script or something.
im not sure if the problem was solved. what you can do though, to try and figure out some problems, is to echo what the sql string would look like instead. so that way you can see what that string would look like yourself.