Exploiting Common Vulnerabilities in PHP Applications

Thursday, 26 September 2002, 1:39 AM EST

PHP has the following characteristics:
- Interpreted,
- Fast Execution - The interpreter is embedded in the web server, no fork() or setup overhead
- Feature Rich - Hundreds of non trivial builtin functions
- Simple Syntax - Non declared and loosely typed variables, 'wordy' function names

Over the course of this paper I'm going to try to explain why I feel the last two characteristics make applications written in PHP easy to attack and hard to defend. Then I'll finish off with a rant about distribution of 'blame' when it comes to software security.

[ Read more ]




Spotlight

Infosec management strategies and the modern CTO

Posted on 21 January 2015.  |  Brandon Hoffman, Lumeta's CTO, talks about the management strategies that are essential in the information security industry. He also offers advice to those stepping into the CTO role for the first time, and talks about the evolution of network situational awareness.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jan 23rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //