<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Woodmi</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Woodmi"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Woodmi"/>
		<updated>2026-04-19T01:09:55Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Testing_for_AJAX_Vulnerabilities_(OWASP-AJ-001)&amp;diff=15281</id>
		<title>Talk:Testing for AJAX Vulnerabilities (OWASP-AJ-001)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Testing_for_AJAX_Vulnerabilities_(OWASP-AJ-001)&amp;diff=15281"/>
				<updated>2007-01-11T20:15:22Z</updated>
		
		<summary type="html">&lt;p&gt;Woodmi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I believe that publishing this SQL injection as a test method is extremely dangerous. While professional testers know not to drop tables from databases, inexperienced testers or malicious users could attempt this on sites with potentially disastrous effects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT id FROM users WHERE name='' AND pass=''; DROP TABLE users;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I would recommend using a more benign SQL injection example, such as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT id FROM users WHERE name=''or+1=1--' AND pass='';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This isn't the best example either as it may allow someone to log into a site, but it's better than dropping the users table.  Then again, all SQL injection is dangerous.&lt;/div&gt;</summary>
		<author><name>Woodmi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=15280</id>
		<title>Talk:OWASP Testing Guide v2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=15280"/>
				<updated>2007-01-11T20:15:04Z</updated>
		
		<summary type="html">&lt;p&gt;Woodmi: added to wrong discussion page, should be on AJAX testing discussion board&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Woodmi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=15279</id>
		<title>Talk:OWASP Testing Guide v2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=15279"/>
				<updated>2007-01-11T20:12:44Z</updated>
		
		<summary type="html">&lt;p&gt;Woodmi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I believe that publishing this SQL injection as a test method is extremely dangerous. While professional testers know not to drop tables from databases, inexperienced testers or malicious users could attempt this on sites with potentially disastrous effects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT id FROM users WHERE name='' AND pass=''; DROP TABLE users;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I would recommend using a more benign SQL injection example, such as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT id FROM users WHERE name=''or+1=1--' AND pass='';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This isn't the best example either as it may allow someone to log into a site, but it's better than dropping the users table.  Then again, all SQL injection is dangerous.&lt;/div&gt;</summary>
		<author><name>Woodmi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=15278</id>
		<title>Talk:OWASP Testing Guide v2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:OWASP_Testing_Guide_v2_Table_of_Contents&amp;diff=15278"/>
				<updated>2007-01-11T20:09:39Z</updated>
		
		<summary type="html">&lt;p&gt;Woodmi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I believe that publishing this SQL injection as a test method is extremely dangerous. While professional testers know not to drop tables from databases, inexperienced testers or malicious users could attempt this on sites with potentially disastrous effects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT id FROM users WHERE name='' AND pass=''; DROP TABLE users;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I would recommend using a more benign SQL injection example, such as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT id FROM users WHERE name=''or+1=1--' AND pass='';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Woodmi</name></author>	</entry>

	</feed>