This commit is contained in:
Bernardo Damele 2009-11-01 12:08:46 +00:00
parent bb123b2769
commit de68a499f5
4 changed files with 5 additions and 2 deletions

View File

@ -156,7 +156,7 @@ rated on 2007 in their
<A HREF="http://www.owasp.org/index.php/Top_10_2007">OWASP Top Ten</A> survey this vulnerability as the
<A HREF="http://www.owasp.org/index.php/Top_10_2007-A2">most common</A> and important web application vulnerability, second only to
<A HREF="http://www.owasp.org/index.php/Top_10_2007-A1">Cross-Site Scripting</A>.</P>
<P>Back to the scenario, probably the SQL <CODE>SELECT</CODE> statemenet into
<P>Back to the scenario, probably the SQL <CODE>SELECT</CODE> statement into
<CODE>get_int.php</CODE> has a syntax similar to the following SQL query, in
pseudo PHP code:</P>
<P>

Binary file not shown.

View File

@ -107,7 +107,7 @@ common"> and important web application vulnerability, second only to
<htmlurl url="http://www.owasp.org/index.php/Top_10_2007-A1"
name="Cross-Site Scripting">.
Back to the scenario, probably the SQL <tt>SELECT</tt> statemenet into
Back to the scenario, probably the SQL <tt>SELECT</tt> statement into
<tt>get_int.php</tt> has a syntax similar to the following SQL query, in
pseudo PHP code:

View File

@ -98,6 +98,9 @@ Daniel Hückmann <sanitybit@gmail.com>
Mounir Idrassi <mounir.idrassi@idrix.net>
for his compiled version of UPX for Mac OS X
Dirk Jagdmann <doj@cubic.org>
for reporting a typo in the documentation
Luke Jahnke <luke.jahnke@gmail.com>
for reporting a bug when running against MySQL < 5.0