<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=LII%3AWeb_Application_Security_Guide%2FSQL_injection</id>
	<title>LII:Web Application Security Guide/SQL injection - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=LII%3AWeb_Application_Security_Guide%2FSQL_injection"/>
	<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Web_Application_Security_Guide/SQL_injection&amp;action=history"/>
	<updated>2026-04-05T03:38:00Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Web_Application_Security_Guide/SQL_injection&amp;diff=26902&amp;oldid=prev</id>
		<title>Shawndouglas: Added further reading</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Web_Application_Security_Guide/SQL_injection&amp;diff=26902&amp;oldid=prev"/>
		<updated>2016-08-10T22:12:00Z</updated>

		<summary type="html">&lt;p&gt;Added further reading&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:12, 10 August 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l4&quot;&gt;Line 4:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 4:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===To prevent this type of attack===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===To prevent this type of attack===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;use &lt;/del&gt;prepared statements to access the database ''– or –''&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Use &lt;/ins&gt;prepared statements to access the database ''– or –''&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;use &lt;/del&gt;stored procedures, accessed using appropriate language/library methods or prepared statements&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Use &lt;/ins&gt;stored procedures, accessed using appropriate language/library methods or prepared statements&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Always ensure the DB login used by the application has only the rights that are needed&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Always ensure the DB login used by the application has only the rights that are needed&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===Rationale===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===Rationale===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l17&quot;&gt;Line 17:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 17:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;====Example====&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;====Example====&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;If the input for the title of the page on this website were vulnerable to SQL injection then the URL that would be used for the attack is '''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''. A simple test to reveal if the input is vulnerable would be to add ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''&amp;lt;nowiki&amp;gt;'&amp;lt;/nowiki&amp;gt;''' because this SQL syntax would break the query and show an SQL error on the page.  The next query could be to select usernames and hashed passwords with something like ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''&amp;lt;nowiki&amp;gt;1%20UNION%20ALL%20SELECT%20user_pass%20FROM%20wiki_user;--&amp;lt;/nowiki&amp;gt;'''.  The ;-- on the end ends the query and makes the remaining query a comment.  Files containing password salts could be dumped to allow an attacker to begin cracking passwords and gain access to administrator accounts using the '''select load_file()''' query.  A query like this one could be used to gain shell access to the server: ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''UNION%20SELECT%20&amp;lt;? system($_REQUEST['cmd']); ?&amp;gt;,2,3%20INTO%20OUTFILE%20&amp;quot;shell.php&amp;quot;;--'''&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;If the input for the title of the page on this website were vulnerable to SQL injection then the URL that would be used for the attack is '''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''. A simple test to reveal if the input is vulnerable would be to add ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''&amp;lt;nowiki&amp;gt;'&amp;lt;/nowiki&amp;gt;''' because this SQL syntax would break the query and show an SQL error on the page.  The next query could be to select usernames and hashed passwords with something like ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''&amp;lt;nowiki&amp;gt;1%20UNION%20ALL%20SELECT%20user_pass%20FROM%20wiki_user;--&amp;lt;/nowiki&amp;gt;'''.  The ;-- on the end ends the query and makes the remaining query a comment.  Files containing password salts could be dumped to allow an attacker to begin cracking passwords and gain access to administrator accounts using the '''select load_file()''' query.  A query like this one could be used to gain shell access to the server: ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''UNION%20SELECT%20&amp;lt;? system($_REQUEST['cmd']); ?&amp;gt;,2,3%20INTO%20OUTFILE%20&amp;quot;shell.php&amp;quot;;--'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;==Further reading==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[wikipedia:SQL injection|SQL injection]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Notes==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Notes==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The original source for this page is [https://en.wikibooks.org/wiki/Web_Application_Security_Guide/SQL_injection the associated Wikibooks article] and is shared here under the [https://creativecommons.org/licenses/by-sa/3.0/ CC BY-SA 3.0] license.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The original source for this page is [https://en.wikibooks.org/wiki/Web_Application_Security_Guide/SQL_injection the associated Wikibooks article] and is shared here under the [https://creativecommons.org/licenses/by-sa/3.0/ CC BY-SA 3.0] license.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-26872:rev-26902 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Web_Application_Security_Guide/SQL_injection&amp;diff=26872&amp;oldid=prev</id>
		<title>Shawndouglas: Created as needed.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Web_Application_Security_Guide/SQL_injection&amp;diff=26872&amp;oldid=prev"/>
		<updated>2016-08-10T20:33:35Z</updated>

		<summary type="html">&lt;p&gt;Created as needed.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{TOC right}}&lt;br /&gt;
==SQL injection==&lt;br /&gt;
An SQL injection vulnerability occurs if user input included in database queries is not escaped correctly. This type of vulnerability allows attackers to change database queries, which can allow them to obtain or modify database contents.&lt;br /&gt;
&lt;br /&gt;
===To prevent this type of attack===&lt;br /&gt;
* use prepared statements to access the database ''– or –''&lt;br /&gt;
* use stored procedures, accessed using appropriate language/library methods or prepared statements&lt;br /&gt;
* Always ensure the DB login used by the application has only the rights that are needed&lt;br /&gt;
&lt;br /&gt;
===Rationale===&lt;br /&gt;
Escaping input manually is error-prone and can be forgotten. With prepared statements, the correct escaping is automatically applied. This also avoids issues with different input interpretation (charset, null byte handling etc.) which can lead to hard-to-find vulnerabilities.&lt;br /&gt;
Using a database login with limited access rights limits the impact of successful attacks.&lt;br /&gt;
&lt;br /&gt;
====Exploitation====&lt;br /&gt;
SQL injection can compromise any information in the database and even lead to full system compromise.  It can be used to add PHP, HTML, and JavaScript code to web pages and create files.  Arbitrary content added to the website can be used for malicious attacks against users and to gain shell access to the server.&lt;br /&gt;
&lt;br /&gt;
====Example====&lt;br /&gt;
If the input for the title of the page on this website were vulnerable to SQL injection then the URL that would be used for the attack is '''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''. A simple test to reveal if the input is vulnerable would be to add ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''&amp;lt;nowiki&amp;gt;'&amp;lt;/nowiki&amp;gt;''' because this SQL syntax would break the query and show an SQL error on the page.  The next query could be to select usernames and hashed passwords with something like ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''&amp;lt;nowiki&amp;gt;1%20UNION%20ALL%20SELECT%20user_pass%20FROM%20wiki_user;--&amp;lt;/nowiki&amp;gt;'''.  The ;-- on the end ends the query and makes the remaining query a comment.  Files containing password salts could be dumped to allow an attacker to begin cracking passwords and gain access to administrator accounts using the '''select load_file()''' query.  A query like this one could be used to gain shell access to the server: ''&amp;lt;nowiki&amp;gt;https://en.wikibooks.org/w/index.php?title=&amp;lt;/nowiki&amp;gt;'''''UNION%20SELECT%20&amp;lt;? system($_REQUEST['cmd']); ?&amp;gt;,2,3%20INTO%20OUTFILE%20&amp;quot;shell.php&amp;quot;;--'''&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
The original source for this page is [https://en.wikibooks.org/wiki/Web_Application_Security_Guide/SQL_injection the associated Wikibooks article] and is shared here under the [https://creativecommons.org/licenses/by-sa/3.0/ CC BY-SA 3.0] license.&lt;/div&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
</feed>