diff --git a/doc/README.html b/doc/README.html index d43ba51c0..df248b679 100644 --- a/doc/README.html +++ b/doc/README.html @@ -156,7 +156,7 @@ rated on 2007 in their OWASP Top Ten survey this vulnerability as the most common and important web application vulnerability, second only to Cross-Site Scripting.

-

Back to the scenario, probably the SQL SELECT statemenet into +

Back to the scenario, probably the SQL SELECT statement into get_int.php has a syntax similar to the following SQL query, in pseudo PHP code:

diff --git a/doc/README.pdf b/doc/README.pdf index ba0e3da04..ad42ba4c3 100644 Binary files a/doc/README.pdf and b/doc/README.pdf differ diff --git a/doc/README.sgml b/doc/README.sgml index 795df813e..cac0c05c7 100644 --- a/doc/README.sgml +++ b/doc/README.sgml @@ -107,7 +107,7 @@ common"> and important web application vulnerability, second only to . -Back to the scenario, probably the SQL SELECT statemenet into +Back to the scenario, probably the SQL SELECT statement into get_int.php has a syntax similar to the following SQL query, in pseudo PHP code: diff --git a/doc/THANKS b/doc/THANKS index 4904b7035..e6523ea38 100644 --- a/doc/THANKS +++ b/doc/THANKS @@ -98,6 +98,9 @@ Daniel Hückmann Mounir Idrassi for his compiled version of UPX for Mac OS X +Dirk Jagdmann + for reporting a typo in the documentation + Luke Jahnke for reporting a bug when running against MySQL < 5.0