Loading ...
Try HTTPCS +33 1 85 09 15 09

Shell Code Injection and PHP Code Injection (PSCI) vulnerability

What is a PSCI vulnerability and how to prevent it?

Shell Code Injection is an attack that consists in executing commands on a victim's operating system via a vulnerable application.

14 days Free trial

No Commitment

No Credit Card

OWASP ranking

What are the Shell Code Injection and Php Code Injection vulnerability ?

Shell Code Injection

This attack is only possible when an application transfers data, entered by a user, to a system shell. Commands are executed with the privileges of the attacked application.

Php Code Injection

Code Injection is an attack similar to command injection. The difference is in the injected code. The Shell Code Injection consists of executing commands whereas here code is injected. The difference between the two attacks is the limit imposed by the functionalities of the language used. If the injection is done in PHP, the attacker will be limited to what PHP is able to do.

Security flaws
Secure your sites

How to protect yourself against Shell Code Injection and Php Code Injection vulnerabilities ?

To protect against Shell and Code Injections, it is necessary, once again, to check all entries of a user so that he can not enter shell or code.

Web Vulnerability Scanner of HTTPCS

How to detect TOP 10 OWASP vulnerabilities?

Detect security flaws on your website or web application thanks to the Web Vulnerability Scanner of HTTPCS. This online security tool allows you to detect any flaws you have (top 10 OWASP, CVE and other vulnerabilities implemented in the robot) to ensure the best protection of your site on a daily basis. Easily schedule automated audits, discover your vulnerabilities and find out what patches to apply to avoid being hacked.

Test for free the PSCI Scanner

14 days Free trial

No Commitment

No Credit Card