|Thanks God Web-APP CMS is NOT made in PHP|
|Written on 02/04/12 at 18:56:03 by On|
As stated 1 trillion times before PHP CMS scripts are:
2. Resource killing (imagine a small distributed denial-of-service attack (DDoS) on a resource killing site...).
3. Lacking well debugged and tested modules
If you still have any doubt about our warnings check read: [url=http://www.computerworld.com/s/article/9223955/PHP_5.3.10_fixes_critical_remote_code_execution_vulnerability]PHP 5.3.10 fixes critical remote code execution vulnerability[/url].
As explained in the article from Computer World:
The vulnerability was introduced by the fix for a hash collision denial-of-service flaw.
It affects a number of Web development platforms including PHP, ASP.NET, Java and Python and can be exploited in a so-called hash collision attack. The PHP development team addressed CVE-2011-4885 in PHP 5.3.9, which was released on Jan. 10.
In short: Stay Safe - Stay Away from PHP. Use the original Perl CMS scripts when and if possible.
The comments are owned by the poster. We aren't responsible for its content.