<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: incompetence</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/incompetence.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2008-05-02T21:01:35+00:00</updated><author><name>Simon Willison</name></author><entry><title>How one site dealt with SQL injection attack</title><link href="https://simonwillison.net/2008/May/2/one/#atom-tag" rel="alternate"/><published>2008-05-02T21:01:35+00:00</published><updated>2008-05-02T21:01:35+00:00</updated><id>https://simonwillison.net/2008/May/2/one/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.networkworld.com/news/2008/050108-autoweb.html"&gt;How one site dealt with SQL injection attack&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Horrifying story of developer incompetence from Autoweb: “The contractor had no idea how to find and fix the Web page vulnerability that allowed the SQL injection attack code to execute successfully.”

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="http://news.ycombinator.com/item?id=179570"&gt;Hacker News&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/autoweb"&gt;autoweb&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/incompetence"&gt;incompetence&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sql-injection"&gt;sql-injection&lt;/a&gt;&lt;/p&gt;



</summary><category term="autoweb"/><category term="incompetence"/><category term="security"/><category term="sql-injection"/></entry></feed>