php Programming Glossary: vulnerability
Security threats with uploads http://stackoverflow.com/questions/11061355/security-threats-with-uploads the supposed image . Be careful here as well if there's a vulnerability in that process a maliciously crafted file may exploit it which..
PHP: mysql v mysqli v pdo [closed] http://stackoverflow.com/questions/12097245/php-mysql-v-mysqli-v-pdo entire application can be destroyed by an automatic SQL vulnerability exploit tool . Both mysqli and PDO support placeholders which..
how safe are PDO prepared statements http://stackoverflow.com/questions/1314521/how-safe-are-pdo-prepared-statements query parameters help you to avoid that form of security vulnerability. Are they 100 proof against any security vulnerability No of.. vulnerability. Are they 100 proof against any security vulnerability No of course not. As you may know a query parameter only takes..
Allow javascript in php form and avoid hacking like JsFiddle http://stackoverflow.com/questions/14162492/allow-javascript-in-php-form-and-avoid-hacking-like-jsfiddle although from time to time someone has discovered a vulnerability in it. You may not want to rely on Caja as your sole layer of..
Htmlentities vs addslashes vs mysqli_real_escape_string http://stackoverflow.com/questions/2214244/htmlentities-vs-addslashes-vs-mysqli-real-escape-string data but it seems like addslashes is the one with the vulnerability. Is this true or am I remembering incorrectly php security..
In a PHP / Apache / Linux context, why exactly is chmod 777 dangerous? http://stackoverflow.com/questions/2338641/in-a-php-apache-linux-context-why-exactly-is-chmod-777-dangerous command line php interpreter right So where exactly is the vulnerability with 777 Is it the fact that other users on the same machine..
How to secure phpMyAdmin http://stackoverflow.com/questions/2631269/how-to-secure-phpmyadmin The biggest threat is that an attacker could leverage a vulnerability such as directory traversal in the application to read the plain..
Historical security flaws of popular PHP CMS's? http://stackoverflow.com/questions/2951917/historical-security-flaws-of-popular-php-cmss to be concerned with that they perhaps didn't face as a vulnerability because they handled it correctly from the start What additional.. example using the onerror event of the img tag vBulletin vulnerability . Or you have the old Myspace's Samy . CMS examples CMS made..
What security problems could come from exposing phpinfo() to end users? http://stackoverflow.com/questions/3196011/what-security-problems-could-come-from-exposing-phpinfo-to-end-users isn't necessarily a risk but in combination with another vulnerability could lead to your site becoming compromised. Obviously the..
a better approach than storing mysql password in plain text in config file? http://stackoverflow.com/questions/3354242/a-better-approach-than-storing-mysql-password-in-plain-text-in-config-file rules in .htaccess in case php fails or there's a security vulnerability to read php source destroy the password in memory after the..
Many hash iterations: append salt every time? http://stackoverflow.com/questions/3559437/many-hash-iterations-append-salt-every-time to generate a rainbow table... Yes it does expose a DOS vulnerability but it also prevents brute force attacks or at least makes them..
htmlspecialchars vs htmlentities when concerned with XSS http://stackoverflow.com/questions/3623236/htmlspecialchars-vs-htmlentities-when-concerned-with-xss 9 http securethoughts.com 2009 05 exploiting ie8 utf 7 xss vulnerability using local redirection For instance php _GET 'password' 'asdf..
Why would one omit the close tag? http://stackoverflow.com/questions/4410704/why-would-one-omit-the-close-tag headers inadvertently you might have introduced a security vulnerability say you are doing a redirection but hence the headers are already..
Protect against SQL injection http://stackoverflow.com/questions/4749588/protect-against-sql-injection security. However they didn't show me how to exploit this vulnerability. How can I could you break this code How can I secure it php..
MySQL injection protection and vulnerability signs using PHP http://stackoverflow.com/questions/544239/mysql-injection-protection-and-vulnerability-signs-using-php injection protection and vulnerability signs using PHP What are the best ways to protect from MySQL..
Stop people uploading malicious PHP files via forms http://stackoverflow.com/questions/602539/stop-people-uploading-malicious-php-files-via-forms that's what other tools that have suffered the same vulnerability have done. But I still wouldn't trust extractTo against hostile..
Replacing invalid UTF-8 characters by question marks, mbstring.substitute_character seems ignored http://stackoverflow.com/questions/8215050/replacing-invalid-utf-8-characters-by-question-marks-mbstring-substitute-charac need pay attention to the range of bytes for avoiding the vulnerability of UTF 8 non shortest form. the range of trail bytes change..
Converting MySQL to PDO http://stackoverflow.com/questions/9212794/converting-mysql-to-pdo concider your code again especially regarding the XSS vulnerability Also for a good developers sake refactor rewrite your database...
|