Skip to content

Commit

Permalink
Gender Neutral Language
Browse files Browse the repository at this point in the history
  • Loading branch information
edent authored and greg0ire committed May 9, 2023
1 parent 4896179 commit 5996d4b
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion docs/en/reference/data-retrieval-and-manipulation.rst
Original file line number Diff line number Diff line change
Expand Up @@ -236,7 +236,7 @@ the following very common SQL statement:
SELECT * FROM articles WHERE id IN (?)
Since you are using an ``IN`` expression you would really like to use it in the following way
(and I guess everybody has tried to do this once in his life, before realizing it doesn't work):
(and I guess everybody has tried to do this once in their life, before realizing it doesn't work):

.. code-block:: php
Expand Down
2 changes: 1 addition & 1 deletion docs/en/reference/security.rst
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ SQL or DQL query. For Example:
// Very wrong!
$sql = "SELECT * FROM users WHERE name = '" . $_GET['username']. "'";
An attacker could inject any value into the GET variable "username" to modify the query to his needs.
An attacker could inject any value into the GET variable "username" to modify the query to their needs.

Although DQL is a wrapper around SQL that can prevent some security implications, the previous
example is also a threat to DQL queries.
Expand Down

0 comments on commit 5996d4b

Please sign in to comment.