Skip to content

Commit

Permalink
Merge pull request #6036 from edent/patch-3
Browse files Browse the repository at this point in the history
Gender Neutral Language
  • Loading branch information
greg0ire committed May 9, 2023
2 parents 4896179 + 5996d4b commit 4d27b98
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion docs/en/reference/data-retrieval-and-manipulation.rst
Original file line number Diff line number Diff line change
Expand Up @@ -236,7 +236,7 @@ the following very common SQL statement:
SELECT * FROM articles WHERE id IN (?)
Since you are using an ``IN`` expression you would really like to use it in the following way
(and I guess everybody has tried to do this once in his life, before realizing it doesn't work):
(and I guess everybody has tried to do this once in their life, before realizing it doesn't work):

.. code-block:: php
Expand Down
2 changes: 1 addition & 1 deletion docs/en/reference/security.rst
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ SQL or DQL query. For Example:
// Very wrong!
$sql = "SELECT * FROM users WHERE name = '" . $_GET['username']. "'";
An attacker could inject any value into the GET variable "username" to modify the query to his needs.
An attacker could inject any value into the GET variable "username" to modify the query to their needs.

Although DQL is a wrapper around SQL that can prevent some security implications, the previous
example is also a threat to DQL queries.
Expand Down

0 comments on commit 4d27b98

Please sign in to comment.