OWASP

2017 OWASP Top 10 for PHP Developers Part 5: Broken Access Control

Let's take a scenario like so: I have a web application that allows people to buy software I created -…

6 years ago

2017 OWASP Top 10 for PHP Developers Part 4: XML External Entities (XXE)

Ever processed XML files in your web application? If you did, you probably parsed their contents. And if you parsed…

6 years ago

2017 OWASP Top 10 for PHP Developers Part 3: Sensitive Data Exposure

There is a lot of exposed data floating on the web. People hear about such events all the time -…

6 years ago

2017 OWASP Top 10 for PHP Developers Part 2: Broken Authentication and Session Management

While browsing the web, you click on a link. The link leads you to a page like this: Looks like…

6 years ago

SQL Injection – What it is, how it works & how it can be mitigated

SQL Injection. If You're decently security-minded, You've probably heard of it. But what is it exactly? How does it work and,…

7 years ago