X-Git-Url: http://www.aleph1.co.uk/gitweb/?p=yaffs-website;a=blobdiff_plain;f=web%2Fmodules%2Fcontrib%2Fadvanced_help%2Fhelp_example%2Fhelp%2Fsecurity.html;fp=web%2Fmodules%2Fcontrib%2Fadvanced_help%2Fhelp_example%2Fhelp%2Fsecurity.html;h=31d43dcebdc775c4e376073488f2831ba1a29f42;hp=0000000000000000000000000000000000000000;hb=8acec36f19c470dfcda1ae2336826a782f41874c;hpb=e0411c4e83ba0d079034db83c3f7f55be24a0e35 diff --git a/web/modules/contrib/advanced_help/help_example/help/security.html b/web/modules/contrib/advanced_help/help_example/help/security.html new file mode 100644 index 000000000..31d43dceb --- /dev/null +++ b/web/modules/contrib/advanced_help/help_example/help/security.html @@ -0,0 +1 @@ +

PHP is a popular target of hackers who exploit vulnerable applications written in PHP. Software vulnerabilities related to PHP are identified among the CVE (Common Vulnerabilities and Exposures) records, available from the National Vulnerability Database. The proportion of vulnerabilities related to PHP, out of the total of all common vulnerabilities, amounted to: 12% in 2003, 20% in 2004, 28% in 2005, 43% in 2006, 36% in 2007, and 33.8% for the first quarter of 2008. More than a quarter of all software vulnerabilities listed in this database are related to PHP, and more than a third of vulnerabilities listed recently. Most of these vulnerabilities can be exploited remotely, that is without being logged on the computer hosting the vulnerable application.[28] Such exploitation is made possible due to poor programming habits, such as failing to check data before entering it into a database, and features of the language such as register_globals, which is now deprecated.[22] These result in code injection, cross-site scripting and other application security issues. It's important to note that none of these attacks are exclusive to PHP and all are avoidable by following proper coding techniques and principles.