A few days later, hackers break in to a Brazilian power grid operator, using, you guessed it, an SQL injection attack.
Seriously, isn't is about time we stop accepting these kinds of failures? I think it is, and thats one of the reasons I wrote ESXX in the first place:
- ESXX apps never build XML or HTML output as strings, they always operate on real XML nodes which ensures that all text nodes or attributes are properly quoted when output or transformed by the style-sheets. Meaning no cross-site scripting attacks, without effort!
- In ESXX, it's easier to use prepared SQL statements than it is to build SQL queries by hand, which means that all your SQL parameters will always be properly encoded. And without encoding errors, there can be no SQL injection attacks.
2 comments:
And in todays news, an SQL injection attack is used not to break into the victim's server, but rather to deliver harmful code to its visitors.
Some of the Referenced object are deprecated can you please update these classes with latest objects
Post a Comment