From d404f3898948ca0621ea9c01cdef7bd95a017043 Mon Sep 17 00:00:00 2001 From: eiffel-org Date: Fri, 3 Feb 2017 14:36:04 +0000 Subject: [PATCH] Update wikipage EiffelStore SQL injection. (Signed-off-by:javier). git-svn-id: https://svn.eiffel.com/eiffel-org/trunk@1764 abb3cda0-5349-4a8f-a601-0c33ac3a8c38 --- .../database-access/eiffelstore/EiffelStore-SQL-injection.wiki | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/documentation/trunk/solutions/database-access/eiffelstore/EiffelStore-SQL-injection.wiki b/documentation/trunk/solutions/database-access/eiffelstore/EiffelStore-SQL-injection.wiki index 2e62b0fd..d2b5ef9d 100644 --- a/documentation/trunk/solutions/database-access/eiffelstore/EiffelStore-SQL-injection.wiki +++ b/documentation/trunk/solutions/database-access/eiffelstore/EiffelStore-SQL-injection.wiki @@ -20,5 +20,5 @@ A SQL injection attack is a coding technique that consists of insertion or "inje = 2. Template Query = A template query is a string containing the fixed parts of the query and placeholders for the variable parts, and you can later substitute in values into those placeholders. (Bind variables to the query.). A template query could be static or dynamic -Note: the way you bind variables to the query is quite important and it will define if your query is safe and avoid a SQL Injection attack. +{{Note|the way you bind variables to the query is quite important and it will define if your query is safe and avoid a SQL Injection attack.}}