¡@

Home 

php Programming Glossary: vulnerability

Security threats with uploads

http://stackoverflow.com/questions/11061355/security-threats-with-uploads

the supposed image . Be careful here as well if there's a vulnerability in that process a maliciously crafted file may exploit it which..

PHP: mysql v mysqli v pdo [closed]

http://stackoverflow.com/questions/12097245/php-mysql-v-mysqli-v-pdo

entire application can be destroyed by an automatic SQL vulnerability exploit tool . Both mysqli and PDO support placeholders which..

how safe are PDO prepared statements

http://stackoverflow.com/questions/1314521/how-safe-are-pdo-prepared-statements

query parameters help you to avoid that form of security vulnerability. Are they 100 proof against any security vulnerability No of.. vulnerability. Are they 100 proof against any security vulnerability No of course not. As you may know a query parameter only takes..

Allow javascript in php form and avoid hacking like JsFiddle

http://stackoverflow.com/questions/14162492/allow-javascript-in-php-form-and-avoid-hacking-like-jsfiddle

although from time to time someone has discovered a vulnerability in it. You may not want to rely on Caja as your sole layer of..

Htmlentities vs addslashes vs mysqli_real_escape_string

http://stackoverflow.com/questions/2214244/htmlentities-vs-addslashes-vs-mysqli-real-escape-string

data but it seems like addslashes is the one with the vulnerability. Is this true or am I remembering incorrectly php security..

In a PHP / Apache / Linux context, why exactly is chmod 777 dangerous?

http://stackoverflow.com/questions/2338641/in-a-php-apache-linux-context-why-exactly-is-chmod-777-dangerous

command line php interpreter right So where exactly is the vulnerability with 777 Is it the fact that other users on the same machine..

How to secure phpMyAdmin

http://stackoverflow.com/questions/2631269/how-to-secure-phpmyadmin

The biggest threat is that an attacker could leverage a vulnerability such as directory traversal in the application to read the plain..

Historical security flaws of popular PHP CMS's?

http://stackoverflow.com/questions/2951917/historical-security-flaws-of-popular-php-cmss

to be concerned with that they perhaps didn't face as a vulnerability because they handled it correctly from the start What additional.. example using the onerror event of the img tag vBulletin vulnerability . Or you have the old Myspace's Samy . CMS examples CMS made..

What security problems could come from exposing phpinfo() to end users?

http://stackoverflow.com/questions/3196011/what-security-problems-could-come-from-exposing-phpinfo-to-end-users

isn't necessarily a risk but in combination with another vulnerability could lead to your site becoming compromised. Obviously the..

a better approach than storing mysql password in plain text in config file?

http://stackoverflow.com/questions/3354242/a-better-approach-than-storing-mysql-password-in-plain-text-in-config-file

rules in .htaccess in case php fails or there's a security vulnerability to read php source destroy the password in memory after the..

Many hash iterations: append salt every time?

http://stackoverflow.com/questions/3559437/many-hash-iterations-append-salt-every-time

to generate a rainbow table... Yes it does expose a DOS vulnerability but it also prevents brute force attacks or at least makes them..

htmlspecialchars vs htmlentities when concerned with XSS

http://stackoverflow.com/questions/3623236/htmlspecialchars-vs-htmlentities-when-concerned-with-xss

9 http securethoughts.com 2009 05 exploiting ie8 utf 7 xss vulnerability using local redirection For instance php _GET 'password' 'asdf..

Why would one omit the close tag?

http://stackoverflow.com/questions/4410704/why-would-one-omit-the-close-tag

headers inadvertently you might have introduced a security vulnerability say you are doing a redirection but hence the headers are already..

Protect against SQL injection

http://stackoverflow.com/questions/4749588/protect-against-sql-injection

security. However they didn't show me how to exploit this vulnerability. How can I could you break this code How can I secure it php..

MySQL injection protection and vulnerability signs using PHP

http://stackoverflow.com/questions/544239/mysql-injection-protection-and-vulnerability-signs-using-php

injection protection and vulnerability signs using PHP What are the best ways to protect from MySQL..

Stop people uploading malicious PHP files via forms

http://stackoverflow.com/questions/602539/stop-people-uploading-malicious-php-files-via-forms

that's what other tools that have suffered the same vulnerability have done. But I still wouldn't trust extractTo against hostile..

Replacing invalid UTF-8 characters by question marks, mbstring.substitute_character seems ignored

http://stackoverflow.com/questions/8215050/replacing-invalid-utf-8-characters-by-question-marks-mbstring-substitute-charac

need pay attention to the range of bytes for avoiding the vulnerability of UTF 8 non shortest form. the range of trail bytes change..

Converting MySQL to PDO

http://stackoverflow.com/questions/9212794/converting-mysql-to-pdo

concider your code again especially regarding the XSS vulnerability Also for a good developers sake refactor rewrite your database...