[prev in list] [next in list] [prev in thread] [next in thread]
List: php-doc-cvs
Subject: [DOC-CVS] =?utf-8?q?svn:_/phpdoc/en/trunk/_reference/filesystem/functions/fopen.xml_security/databas
From: George_Peter_Banyard <girgias () php ! net>
Date: 2019-06-25 15:42:46
Message-ID: svn-girgias-1561477366-347660-1320734477 () svn ! php ! net
[Download RAW message or body]
girgias Tue, 25 Jun 2019 15:42:46 +0000
Revision: http://svn.php.net/viewvc?view=revision&revision=347660
Log:
Typos
Changed paths:
U phpdoc/en/trunk/reference/filesystem/functions/fopen.xml
U phpdoc/en/trunk/security/database.xml
Modified: phpdoc/en/trunk/reference/filesystem/functions/fopen.xml
===================================================================
--- phpdoc/en/trunk/reference/filesystem/functions/fopen.xml 2019-06-25 15:41:08 UTC (rev 347659)
+++ phpdoc/en/trunk/reference/filesystem/functions/fopen.xml 2019-06-25 15:42:46 UTC (rev 347660)
@@ -301,7 +301,7 @@
<row>
<entry>7.0.16, 7.1.2</entry>
<entry>
- The <literal>'e'</literal> option were added.
+ The <literal>'e'</literal> option was added.
</entry>
</row>
<row>
Modified: phpdoc/en/trunk/security/database.xml
===================================================================
--- phpdoc/en/trunk/security/database.xml 2019-06-25 15:41:08 UTC (rev 347659)
+++ phpdoc/en/trunk/security/database.xml 2019-06-25 15:42:46 UTC (rev 347660)
@@ -303,11 +303,11 @@
]]>
</programlisting>
</example>
- But a malicious user sumbits the value
+ But if a malicious user submits the value
<literal>' or uid like'%admin%</literal> to <varname>$uid</varname> to
change the admin's password, or simply sets <varname>$pwd</varname> to
<literal>hehehe', trusted=100, admin='yes</literal> to gain more
- privileges. Then, the query will be twisted:
+ privileges, then, the query will be twisted:
<informalexample>
<programlisting role="php">
<![CDATA[
@@ -326,7 +326,7 @@
</informalexample>
</para>
<para>
- A frightening example how operating system level commands can be accessed
+ A frightening example of how operating system level commands can be accessed
on some database hosts.
<example>
<title>Attacking the database hosts operating system (MSSQL Server)</title>
--
PHP Documentation Commits Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic