From 02c2a1f6139674a7b289db1414db358dc86ed1e3 Mon Sep 17 00:00:00 2001 From: rizanBcodes <100106906+rizanBcodes@users.noreply.github.com> Date: Thu, 6 Oct 2022 20:20:57 +0545 Subject: [PATCH] fixed typo databse --> database --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index a72271c..825d28c 100644 --- a/README.md +++ b/README.md @@ -62,7 +62,7 @@ access controls such as the same-origin policy. SQL (Structured Query Language) injection is a vulnerability where an attacker can perform malicious query directly to the database resulting in compromise of whole system. It normally happens when an application accepts user input and takes that to query directly -without any sort of sanitization and hence the databse takes it as a legitimate query and performs the task as per user input. An easy remediation for this is to use prepared statements or completely escape the user inputs. +without any sort of sanitization and hence the database takes it as a legitimate query and performs the task as per user input. An easy remediation for this is to use prepared statements or completely escape the user inputs. ---