[prev in list] [next in list] [prev in thread] [next in thread] 

List:       php-doc-cvs
Subject:    [DOC-CVS] =?utf-8?q?svn:_/phpdoc/en/trunk/_reference/filesystem/functions/fopen.xml_security/databas
From:       George_Peter_Banyard <girgias () php ! net>
Date:       2019-06-25 15:42:46
Message-ID: svn-girgias-1561477366-347660-1320734477 () svn ! php ! net
[Download RAW message or body]

girgias                                  Tue, 25 Jun 2019 15:42:46 +0000

Revision: http://svn.php.net/viewvc?view=revision&revision=347660

Log:
Typos

Changed paths:
    U   phpdoc/en/trunk/reference/filesystem/functions/fopen.xml
    U   phpdoc/en/trunk/security/database.xml

Modified: phpdoc/en/trunk/reference/filesystem/functions/fopen.xml
===================================================================
--- phpdoc/en/trunk/reference/filesystem/functions/fopen.xml	2019-06-25 15:41:08 UTC (rev 347659)
+++ phpdoc/en/trunk/reference/filesystem/functions/fopen.xml	2019-06-25 15:42:46 UTC (rev 347660)
@@ -301,7 +301,7 @@
       <row>
        <entry>7.0.16, 7.1.2</entry>
        <entry>
-        The <literal>'e'</literal> option were added.
+        The <literal>'e'</literal> option was added.
        </entry>
       </row>
       <row>

Modified: phpdoc/en/trunk/security/database.xml
===================================================================
--- phpdoc/en/trunk/security/database.xml	2019-06-25 15:41:08 UTC (rev 347659)
+++ phpdoc/en/trunk/security/database.xml	2019-06-25 15:42:46 UTC (rev 347660)
@@ -303,11 +303,11 @@
 ]]>
       </programlisting>
      </example>
-     But a malicious user sumbits the value
+     But if a malicious user submits the value
      <literal>' or uid like'%admin%</literal> to <varname>$uid</varname> to
      change the admin's password, or simply sets <varname>$pwd</varname> to
      <literal>hehehe', trusted=100, admin='yes</literal> to gain more
-     privileges. Then, the query will be twisted:
+     privileges, then, the query will be twisted:
      <informalexample>
       <programlisting role="php">
 <![CDATA[
@@ -326,7 +326,7 @@
      </informalexample>
     </para>
     <para>
-     A frightening example how operating system level commands can be accessed
+     A frightening example of how operating system level commands can be accessed
      on some database hosts.
      <example>
      <title>Attacking the database hosts operating system (MSSQL Server)</title>



-- 
PHP Documentation Commits Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic