diff --git a/doc/README.html b/doc/README.html index d43ba51c0..df248b679 100644 --- a/doc/README.html +++ b/doc/README.html @@ -156,7 +156,7 @@ rated on 2007 in their OWASP Top Ten survey this vulnerability as the most common and important web application vulnerability, second only to Cross-Site Scripting.
-Back to the scenario, probably the SQL SELECT statemenet into
+
Back to the scenario, probably the SQL SELECT statement into
get_int.php has a syntax similar to the following SQL query, in
pseudo PHP code:
diff --git a/doc/README.pdf b/doc/README.pdf
index ba0e3da04..ad42ba4c3 100644
--- a/doc/README.pdf
+++ b/doc/README.pdf
@@ -1134,25 +1134,27 @@ endobj
/ProcSet [ /PDF /Text ]
>> endobj
416 0 obj <<
-/Length 2873
+/Length 2874
/Filter /FlateDecode
>>
stream
-xYYoG~ׯ `=D܇
cr ec!lmAa뷮Pc7/cnfף#ZgbolU]~tfkmAQm>8zwR;h=|;r=\{Hz]}jjvݭZ]N^`}:@#G8-" Hn%VVo;_xih}-3(VV+>8VZ
-w7xS~R9
tyJUo
8ZfpJۼmU4ZV_pOems
-7(KX"c}/na}lU
u+Rut~CUWvHʈřufWYC}F
-'Zkv@q\ռRn+\Ù|w:YU^V
-}\:?T[f|މ1*
;]a*oTι#5-I4K@ɣ ԉgp>>9qSvvm׃GrOۼȶ':'p⟺lfw~NbHYt2ٛ?ϭϦA<J.3y`K{{&?T}bǺ+4(f0
7C_),vhXUr{^Aw!BTp<|8 9\=o}^;wf_OSB2#P-ڥ-W|QSn=`F#aH
-{%y}y]ߧylPV|;o,7kėy$ienL &+_bHUk09ݸj/ߨ֜HB$' xSC
ȿX'
8Ӕ]'
o?^wp27N4
-/aI?<D"o堆Za >2hcAZeff%}(hk*