<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ePanorama.net &#187; PHP</title>
	<atom:link href="http://www.epanorama.net/blog/category/php/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 09 Apr 2026 16:04:39 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>How to install PHP 7.x as PHP-FPM &amp; FastCGI for ISPConfig 3.1 with apt on Debian 8 and 9</title>
		<link>https://www.epanorama.net/blog/2017/07/15/how-to-install-php-7-x-as-php-fpm-fastcgi-for-ispconfig-3-1-with-apt-on-debian-8-and-9/</link>
		<comments>https://www.epanorama.net/blog/2017/07/15/how-to-install-php-7-x-as-php-fpm-fastcgi-for-ispconfig-3-1-with-apt-on-debian-8-and-9/#comments</comments>
		<pubDate>Sat, 15 Jul 2017 09:19:32 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[PHP]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=57453</guid>
		<description><![CDATA[<p>https://www.howtoforge.com/tutorial/how-to-install-php-7-for-ispconfig-3-from-debian-packages-on-debian-8-and-9/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3B%2FwhvEjEgRhisaaV5VB6iug%3D%3D available now. PHP 7.1 is the next generation of the PHP programming language, it is up to 2 times faster than PHP 5.6 and 14 times faster than PHP 5.0 according to the release notes. The new PHP version is not 100% compatible with PHP 5.x as some deprecated API&#8217;s have been removed. <a class="moretag" href="https://www.epanorama.net/blog/2017/07/15/how-to-install-php-7-x-as-php-fpm-fastcgi-for-ispconfig-3-1-with-apt-on-debian-8-and-9/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="https://www.howtoforge.com/tutorial/how-to-install-php-7-for-ispconfig-3-from-debian-packages-on-debian-8-and-9/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3B%2FwhvEjEgRhisaaV5VB6iug%3D%3D">https://www.howtoforge.com/tutorial/how-to-install-php-7-for-ispconfig-3-from-debian-packages-on-debian-8-and-9/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3B%2FwhvEjEgRhisaaV5VB6iug%3D%3D</a></p>
<p><span style="color: rgb(71, 75, 81); font-family: Tahoma, Helvetica, Arial, sans-serif; font-size: 14px; background-color: rgb(255, 255, 255);">available now. PHP 7.1 is the next generation of the PHP programming language, it is up to 2 times faster than PHP 5.6 and 14 times faster than PHP 5.0 according to the release notes. The new PHP version is not 100% compatible with PHP 5.x as some deprecated API&#8217;s have been removed.</span><br />
<span style="color: rgb(71, 75, 81); font-family: Tahoma, Helvetica, Arial, sans-serif; font-size: 14px; background-color: rgb(255, 255, 255);"><br />
</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2017/07/15/how-to-install-php-7-x-as-php-fpm-fastcgi-for-ispconfig-3-1-with-apt-on-debian-8-and-9/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>3 Critical Zero-Day Flaws Found in PHP 7 — One Remains Unpatched!</title>
		<link>https://www.epanorama.net/blog/2016/12/29/3-critical-zero-day-flaws-found-in-php-7-one-remains-unpatched/</link>
		<comments>https://www.epanorama.net/blog/2016/12/29/3-critical-zero-day-flaws-found-in-php-7-one-remains-unpatched/#comments</comments>
		<pubDate>Thu, 29 Dec 2016 15:05:39 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[PHP]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=50989</guid>
		<description><![CDATA[<p>http://thehackernews.com/2016/12/php-7-update.html?m=1 Newest PHP version has security issues, and so has some older versions. <a class="moretag" href="https://www.epanorama.net/blog/2016/12/29/3-critical-zero-day-flaws-found-in-php-7-one-remains-unpatched/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://thehackernews.com/2016/12/php-7-update.html?m=1">http://thehackernews.com/2016/12/php-7-update.html?m=1</a></p>
<p>Newest PHP version has security issues, and so has some older versions.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2016/12/29/3-critical-zero-day-flaws-found-in-php-7-one-remains-unpatched/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Vulnerability httpoxy for PHP, Go, Python and others</title>
		<link>https://www.epanorama.net/blog/2016/08/05/vulnerability-httpoxy-for-php-go-python-and-others/</link>
		<comments>https://www.epanorama.net/blog/2016/08/05/vulnerability-httpoxy-for-php-go-python-and-others/#comments</comments>
		<pubDate>Fri, 05 Aug 2016 05:54:12 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=44871</guid>
		<description><![CDATA[<p>A CGI application vulnerability called httpoxy was announced in July with coordinated disclosure from many vendors. httpoxy is a set of vulnerabilities that affect application code running in CGI, or CGI-like environments.  The vulnerability allows an attacker to remotely set the HTTP_PROXY environment variable on affected servers which can lead to a number of bad <a class="moretag" href="https://www.epanorama.net/blog/2016/08/05/vulnerability-httpoxy-for-php-go-python-and-others/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><!--StartFragment-->A <a href="https://blog.qualys.com/laws-of-vulnerabilities/2016/07/18/cgi-application-vulnerability-httpoxy-for-php-go-python-and-others">CGI application vulnerability</a> called <a href="https://httpoxy.org/">httpoxy</a> was <a href="https://httpoxy.org/">announced</a> in July with coordinated disclosure from many vendors. <!--StartFragment--><a href="https://httpoxy.org/"><em>httpoxy</em></a> is a set of vulnerabilities that affect application code running in CGI, or CGI-like environments.  The <a href="https://blog.qualys.com/laws-of-vulnerabilities/2016/07/18/cgi-application-vulnerability-httpoxy-for-php-go-python-and-others">vulnerability allows an attacker to remotely set the HTTP_PROXY environment variable on affected servers which can lead to a number of bad consequences</a>. <!--StartFragment-->This can lead to a <a href="https://httpoxy.org/">remotely exploitable vulnerability</a>.<!--StartFragment-->This vulnerability mainly<a href="https://blog.cloudflare.com/cloudflare-sites-protected-from-httpoxy/"> affects applications that use “classic” CGI execution models</a>. For PHP (both CGI and mod_php versions) w<!--StartFragment-->hether you are vulnerable <a href="https://httpoxy.org/">depends on your specific application code and PHP libraries</a>. If your run Python or Go under CGI, they can also be vulnerable. <!--StartFragment--><a href="https://httpoxy.org/">httpoxy has a number of CVEs</a> assigned to it.<!--EndFragment--><!--EndFragment--><!--EndFragment--></p>
<p>This issue is not new, but has just became to limelight again. <!--StartFragment--><a href="https://www.howtoforge.com/tutorial/httpoxy-protect-your-server/">HTTPOXY affects clients that honor the HTTP_PROXY variable and use it for their proxy configuration and server side applications which use HTTP_PROXY as real or emulated variable in their environment</a>. This bug was first discovered over 15 years ago &#8211; but still in July 2016 researchers found that the <!--StartFragment--><a href="https://httpoxy.org/">vulnerability was still exploitable in PHP</a><!--EndFragment-->. <!--StartFragment-->So, the <a href="https://httpoxy.org/">bug was lying dormant for years, like a latent infection</a>: pox. To put it plainly: <a href="https://httpoxy.org/">there is no way to trust the value of an <code class="highlighter-rouge">HTTP_</code> env var in a CGI environment</a><!--EndFragment--> and <a href="https://httpoxy.org/">you should block the Proxy header</a>.</p>
<p><!--StartFragment-->Best advice is to patch as soon as possible. Immediate mitigation before patching can be performed by blocking ‘Proxy’ request headers as early as possible -<!--StartFragment--> <a href="https://httpoxy.org/">httproxy.org</a> has released details for many enviroments (Apache, OpenBSD, Nginx/FastCGI and others).<!--StartFragment--> <a href="https://httpoxy.org/">If you’re running PHP or CGI, you should <strong><em>block the <code class="highlighter-rouge">Proxy</code> header</em></strong> now</a>. Blocking can be done in <a href="https://www.apache.org/security/asf-httpoxy-response.txt">web server</a>, web load balancer, web proxy or <a href="https://blog.cloudflare.com/cloudflare-sites-protected-from-httpoxy/">cloud proxy service</a>.</p>
<p><!--StartFragment-->The <a href="https://www.howtoforge.com/tutorial/httpoxy-protect-your-server/">vulnerability is easily remotely exploitable and servers can be scanned for it</a>, for details on that read <!--StartFragment--><a href="https://www.howtoforge.com/tutorial/httpoxy-protect-your-server/">HTTPOXY Vulnerability: How to protect and test your web server</a><!--EndFragment--><!--EndFragment--><!--EndFragment--><!--EndFragment--><!--EndFragment--> article that recommends <!--StartFragment--><a href="https://httpoxy.rehmann.co/">https://httpoxy.rehmann.co/</a><!--EndFragment--> service for testing your own servers.</p>
<p><a href="https://httpoxy.org/"><img class="alignnone" src="https://httpoxy.org/img/logo.svg" alt="" width="400" height="200" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2016/08/05/vulnerability-httpoxy-for-php-go-python-and-others/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>How to Safely Store Your Users&#8217; Passwords in 2016 &#8211; Paragon Initiative Enterprises Blog</title>
		<link>https://www.epanorama.net/blog/2016/02/19/how-to-safely-store-your-users-passwords-in-2016-paragon-initiative-enterprises-blog/</link>
		<comments>https://www.epanorama.net/blog/2016/02/19/how-to-safely-store-your-users-passwords-in-2016-paragon-initiative-enterprises-blog/#comments</comments>
		<pubDate>Fri, 19 Feb 2016 16:44:55 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Computers]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=39227</guid>
		<description><![CDATA[<p>Modern, Secure, Salted Password Hashing Made Simple https://paragonie.com/blog/2016/02/how-safely-store-password-in-2016 Posted from WordPress for Android <a class="moretag" href="https://www.epanorama.net/blog/2016/02/19/how-to-safely-store-your-users-passwords-in-2016-paragon-initiative-enterprises-blog/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Modern, Secure, Salted Password Hashing Made Simple</p>
<p><a href="https://paragonie.com/blog/2016/02/how-safely-store-password-in-2016">https://paragonie.com/blog/2016/02/how-safely-store-password-in-2016</a></p>
<p><span class="post_sig">Posted from WordPress for Android</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2016/02/19/how-to-safely-store-your-users-passwords-in-2016-paragon-initiative-enterprises-blog/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
