Skip to content

Commit 4d27b98

Browse files
authored
Merge pull request #6036 from edent/patch-3
Gender Neutral Language
2 parents 4896179 + 5996d4b commit 4d27b98

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

docs/en/reference/data-retrieval-and-manipulation.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ the following very common SQL statement:
236236
SELECT * FROM articles WHERE id IN (?)
237237
238238
Since you are using an ``IN`` expression you would really like to use it in the following way
239-
(and I guess everybody has tried to do this once in his life, before realizing it doesn't work):
239+
(and I guess everybody has tried to do this once in their life, before realizing it doesn't work):
240240

241241
.. code-block:: php
242242

docs/en/reference/security.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ SQL or DQL query. For Example:
6363
// Very wrong!
6464
$sql = "SELECT * FROM users WHERE name = '" . $_GET['username']. "'";
6565
66-
An attacker could inject any value into the GET variable "username" to modify the query to his needs.
66+
An attacker could inject any value into the GET variable "username" to modify the query to their needs.
6767

6868
Although DQL is a wrapper around SQL that can prevent some security implications, the previous
6969
example is also a threat to DQL queries.

0 commit comments

Comments
 (0)