<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#x410;&#x437;-&#x431;&#x443;&#x43A;&#x438;</provider_name><provider_url>https://newspaper.azbuki.bg/en/</provider_url><author_name>v.genkov@azbuki.bg</author_name><author_url>https://newspaper.azbuki.bg/en/author/v-genkovazbuki-bg/</author_url><title>Security Analysis on Content Management Systems - &#x410;&#x437;-&#x431;&#x443;&#x43A;&#x438;</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="LiCi94tvuy"&gt;&lt;a href="https://newspaper.azbuki.bg/en/uncategorized/security-analysis-on-content-management-systems/"&gt;Security Analysis on Content Management Systems&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://newspaper.azbuki.bg/en/uncategorized/security-analysis-on-content-management-systems/embed/#?secret=LiCi94tvuy" width="600" height="338" title="&#x201C;Security Analysis on Content Management Systems&#x201D; &#x2014; &#x410;&#x437;-&#x431;&#x443;&#x43A;&#x438;" data-secret="LiCi94tvuy" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l&lt;n.length;l++)n[l].style.display="none";for(l=0;l&lt;i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><description>1) Lilyana Petkova, 2) Vasilisa Pavlova 1)&#x201C;LiLuzeNet&#x201D; Ltd (Bulgaria) 2)South-West University &#x201C;Neofit Rilski&#x201D; (Bulgaria) https://doi.org/10.53656/math2022-5-2-sec Abstract. This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS [&hellip;]</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 23/29 objects using Disk
Page Caching using Redis (Requested URI contains query) 
Lazy Loading
Database Caching using Disk (Request-wide modification query)

Served from: newspaper.azbuki.bg @ 2026-04-04 03:06:02 by W3 Total Cache
-->