mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-25 11:03:47 +03:00
Typo fix
This commit is contained in:
parent
bb123b2769
commit
de68a499f5
|
@ -156,7 +156,7 @@ rated on 2007 in their
|
|||
<A HREF="http://www.owasp.org/index.php/Top_10_2007">OWASP Top Ten</A> survey this vulnerability as the
|
||||
<A HREF="http://www.owasp.org/index.php/Top_10_2007-A2">most common</A> and important web application vulnerability, second only to
|
||||
<A HREF="http://www.owasp.org/index.php/Top_10_2007-A1">Cross-Site Scripting</A>.</P>
|
||||
<P>Back to the scenario, probably the SQL <CODE>SELECT</CODE> statemenet into
|
||||
<P>Back to the scenario, probably the SQL <CODE>SELECT</CODE> statement into
|
||||
<CODE>get_int.php</CODE> has a syntax similar to the following SQL query, in
|
||||
pseudo PHP code:</P>
|
||||
<P>
|
||||
|
|
BIN
doc/README.pdf
BIN
doc/README.pdf
Binary file not shown.
|
@ -107,7 +107,7 @@ common"> and important web application vulnerability, second only to
|
|||
<htmlurl url="http://www.owasp.org/index.php/Top_10_2007-A1"
|
||||
name="Cross-Site Scripting">.
|
||||
|
||||
Back to the scenario, probably the SQL <tt>SELECT</tt> statemenet into
|
||||
Back to the scenario, probably the SQL <tt>SELECT</tt> statement into
|
||||
<tt>get_int.php</tt> has a syntax similar to the following SQL query, in
|
||||
pseudo PHP code:
|
||||
|
||||
|
|
|
@ -98,6 +98,9 @@ Daniel Hückmann <sanitybit@gmail.com>
|
|||
Mounir Idrassi <mounir.idrassi@idrix.net>
|
||||
for his compiled version of UPX for Mac OS X
|
||||
|
||||
Dirk Jagdmann <doj@cubic.org>
|
||||
for reporting a typo in the documentation
|
||||
|
||||
Luke Jahnke <luke.jahnke@gmail.com>
|
||||
for reporting a bug when running against MySQL < 5.0
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user