{"version":"1.0","provider_name":"\u0410\u0437-\u0431\u0443\u043a\u0438","provider_url":"https:\/\/newspaper.azbuki.bg\/en\/","author_name":"v.genkov@azbuki.bg","author_url":"https:\/\/newspaper.azbuki.bg\/en\/author\/v-genkovazbuki-bg\/","title":"Security Analysis on Content Management Systems - \u0410\u0437-\u0431\u0443\u043a\u0438","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"cx0AABUNe7\"><a href=\"https:\/\/newspaper.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/\">Security Analysis on Content Management Systems<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/newspaper.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/embed\/#?secret=cx0AABUNe7\" width=\"600\" height=\"338\" title=\"&#8220;Security Analysis on Content Management Systems&#8221; &#8212; \u0410\u0437-\u0431\u0443\u043a\u0438\" data-secret=\"cx0AABUNe7\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"1) Lilyana Petkova, 2) Vasilisa Pavlova 1)\u201cLiLuzeNet\u201d Ltd (Bulgaria) 2)South-West University \u201cNeofit Rilski\u201d (Bulgaria) https:\/\/doi.org\/10.53656\/math2022-5-2-sec Abstract. This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS [&hellip;]"}