|Thanks God Web-APP CMS is NOT made in PHP|
|Published on 02/04/12 at 18:56:03 by On|
As stated 1 trillion times before PHP CMS scripts are:
2. Resource killing (imagine a small distributed denial-of-service attack (DDoS) on a resource killing site...).
3. Lacking well debugged and tested modules
If you still have any doubt about our warnings check read: PHP 5.3.10 fixes critical remote code execution vulnerability.
As explained in the article from Computer World:
The vulnerability was introduced by the fix for a hash collision denial-of-service flaw.
It affects a number of Web development platforms including PHP, ASP.NET, Java and Python and can be exploited in a so-called hash collision attack. The PHP development team addressed CVE-2011-4885 in PHP 5.3.9, which was released on Jan. 10.
In short: Stay Safe - Stay Away from PHP. Use the original Perl CMS scripts when and if possible.
0 comments, (521 reads) All Articles by, On
|The comments are owned by the poster. We aren't responsible for its content.|
Only registered members may comment on articles.
|No comments so far.|