{"id":130,"date":"2006-09-11T18:46:50","date_gmt":"2006-09-11T16:46:50","guid":{"rendered":"http:\/\/146.107.134.84\/wordpress\/index.php\/2006\/09\/11\/sql-injection-and-retrovirus-infection\/"},"modified":"2006-09-15T17:04:17","modified_gmt":"2006-09-15T15:04:17","slug":"sql-injection-and-retrovirus-infection","status":"publish","type":"post","link":"https:\/\/www.wjst.de\/blog\/sciencesurf\/2006\/09\/sql-injection-and-retrovirus-infection\/","title":{"rendered":"SQL injection and retrovirus infection"},"content":{"rendered":"<p>What is similiar to SQL injection (in webforms) and retrovirus infection (of mammals)? I think there is always a vulnerable situation (tainted variable by unexpected data entry  &#8211; or double strand break and ligation) that allows foreign code to be inserted. What is different? Retrovirus insertion is probably position specific while SQL injection can even determine its own target. Yea, yea.<\/p>\n\n<p>&nbsp;<\/p>\n<div class=\"bottom-note\">\n  <span class=\"mod1\">CC-BY-NC Science Surf , accessed 13.04.2026<\/span>\n <\/div>","protected":false},"excerpt":{"rendered":"<p>What is similiar to SQL injection (in webforms) and retrovirus infection (of mammals)? I think there is always a vulnerable situation (tainted variable by unexpected data entry &#8211; or double strand break and ligation) that allows foreign code to be inserted. What is different? Retrovirus insertion is probably position specific while SQL injection can even &hellip; <a href=\"https:\/\/www.wjst.de\/blog\/sciencesurf\/2006\/09\/sql-injection-and-retrovirus-infection\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SQL injection and retrovirus infection<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,9],"tags":[2949,2945],"class_list":["post-130","post","type-post","status-publish","format-standard","hentry","category-genetics-biology","category-computer-software","tag-computer-software","tag-genetics-biology"],"_links":{"self":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":0,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}