This site is in the process of being migrated from a previous system. Strange excerpts or content might persist until I clean up the data.
Photo by on
OWASPs PHP Top 5
Photo by on
OWASP have recently released their PHP Top 5 vulnerabilities based on the frequency they are used in attacks. The majority of the causes for these five vulnerabilities are poor input validation, configuration and permission settings.