From 2ab752bfc312924771d422d8d805dc43d3492c1e Mon Sep 17 00:00:00 2001 From: radmax Date: Wed, 22 Jun 2016 17:06:16 +0200 Subject: [PATCH] typo --- docs/en/reference/security.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/en/reference/security.rst b/docs/en/reference/security.rst index efc0989cf..bb5f0f876 100644 --- a/docs/en/reference/security.rst +++ b/docs/en/reference/security.rst @@ -32,7 +32,7 @@ You can consider the following APIs to be safe from SQL injection: - Queries through the Criteria API on ``Doctrine\ORM\PersistentCollection`` and ``Doctrine\ORM\EntityRepository``. -You are **NOT** save from SQL injection when using user input with: +You are **NOT** safe from SQL injection when using user input with: - Expression API of ``Doctrine\ORM\QueryBuilder`` - Concatenating user input into DQL SELECT, UPDATE or DELETE statements or