php.org PHP Logo
Beginner Intermediate Advanced

Search results for: "insecure requests"

How can hackers exploit insecure include() statements in PHP code?

Hackers can exploit insecure include() statements in PHP code by manipulating the file path parameter passed to the include() function, allowing them...

Why is using mysql_* functions in PHP considered outdated and insecure?

Using mysql_* functions in PHP is considered outdated and insecure because they are deprecated as of PHP 5.5 and removed in PHP 7. Instead, it is reco...

How can the issue of buggy and insecure code be addressed in PHP development?

The issue of buggy and insecure code in PHP development can be addressed by following best practices such as using secure coding techniques, regularly...

Is using $_REQUEST considered outdated and insecure in PHP development?

Using $_REQUEST is generally considered outdated and insecure in PHP development because it combines data from $_GET, $_POST, and $_COOKIE superglobal...

How can PHP developers implement a secure authentication system without storing passwords in plaintext or using insecure methods?

To implement a secure authentication system without storing passwords in plaintext or using insecure methods, PHP developers can use password hashing...

Showing 1 to 5 of 6031 results

‹ 1 2 3 4 5 6 7 8 9 10 ... 1206 1207 ›
PHP.ORG

A free knowledge base for PHP developers. Open to all.

Legal

  • About
  • Contact / Imprint
  • Terms
  • FAQ

© 2025 php.org. All rights reserved.