From 1c7ef9650df22988476e5bf09056787273fa28f8 Mon Sep 17 00:00:00 2001
From: Sweetbread
Date: Fri, 31 Jan 2025 16:23:22 +0300
Subject: [PATCH] style: Prettify HTML
---
templates/_head.html | 2 +-
templates/_header.html | 7 ++++++-
templates/sql-injection.html | 2 +-
3 files changed, 8 insertions(+), 3 deletions(-)
diff --git a/templates/_head.html b/templates/_head.html
index e102e5f..e2b6aa9 100644
--- a/templates/_head.html
+++ b/templates/_head.html
@@ -5,7 +5,7 @@
+
-
Попакошька
\ No newline at end of file
diff --git a/templates/_header.html b/templates/_header.html
index 03be292..a990b97 100644
--- a/templates/_header.html
+++ b/templates/_header.html
@@ -1,3 +1,8 @@
diff --git a/templates/sql-injection.html b/templates/sql-injection.html
index ab6856d..b08ceff 100644
--- a/templates/sql-injection.html
+++ b/templates/sql-injection.html
@@ -8,7 +8,7 @@
login = request.form['login']
password = request.form['pass']
cursor = get_db().cursor()
-cursor.execute(f'SELECT * FROM Users WHERE login == "{login}" AND password == "{password}"')
+cursor.execute(f'SELECT * FROM Users WHERE login == "{login}" AND password == "{password}"')
Примерно так выглядит сообтвествующий код, который позволяет использовать уязвимость