Creation time: 21:56:10, May 16, 2022 Author: Xia Xiaohuang
Store: backend database Insertion point: HTML
The attacker directly uploads or stores the malicious JS code to the vulnerability server. When other users browse the page, the site reads the illegal data stored by the malicious user from the database and can exec ...
Posted by abda53 on Sun, 22 May 2022 22:15:47 +0300
Friends interested in PHP back-end technology and PHP architecture technology, my official group Click here , study together and discuss with each other.
There are already managers in the group to sort out the knowledge system (source code, learning videos and other materials). Welcome to add the group for free.
1, Single node instance
The s ...
Posted by alex.hughson on Fri, 20 May 2022 17:24:46 +0300
The lamp architecture based on apache is one of the mature enterprise website application modes and one of the highest market share in the market. Learning to deploy a basic lamp architecture can be the start of our in-depth study and understanding of the more complex architecture.
1, LAMP overview
LAMP architecture is one of the ...
Posted by ShimmyShine on Fri, 20 May 2022 01:48:27 +0300
What is Composer?
Composer is a tool used by PHP to manage dependencies. It can automatically install these dependent library files. In addition, composer can automatically load classes and create its own packages. Installation of Composer Very simple.
Implement automatic loading of classes
Create composer.com in / home/web/mytp directory JSO ...
Posted by tripleM on Thu, 19 May 2022 20:23:47 +0300
thinkphp3.2.3 sql injection vulnerability analysis
First go to ThinkPHP's official website to download thinkphp_v3.2.3 full version source code( https://www.thinkphp.cn/Down ), and then unzip it to the root directory of phpstudy website.
thinkphp3.2.3 where injection
ThinkPHP/Conf/convention.php, crea ...
Posted by madcrazy1 on Wed, 18 May 2022 22:50:05 +0300
I didn't explain too much. I just moved the default PHP-FPM configuration item.
(1) The properties that can be configured are described as follows:
; Per pool prefix
; It only applies on the following directives:
; - 'access.log'
; - 'slowlog'
; - 'listen' (unixsocket)
; - 'chroot'
; - 'chdir'
; - 'php_values'
; - 'php_admin_va ...
Posted by crazykid on Wed, 18 May 2022 14:36:12 +0300
Request and response are two important links in the life cycle of the framework, and they are the two ends of the framework. The request is responsible for taking over the client's request information, and provides a large number of external interfaces to obtain more refined data. The response is responsible for outputting the ...
Posted by jesse_james on Tue, 17 May 2022 19:57:27 +0300
Why study MySQL? Because MySQL is one of the most popular relational database management systems, MySQL is the best software in web applications. The sql language used by MySQL is the most commonly used standardized language for accessing databases.
Rest assured, friends who read this issue are suitable for: website development, softwar ...
Posted by keigowei on Mon, 16 May 2022 11:38:44 +0300
Is the shopping mode popular? E-commerce giants will not turn a blind eye to shopping. Recently, Taobao launched a special APP, and jd.com also launched a "Shopping Festival". China's two largest e-commerce companies are making efforts in "shopping", which shows how popular shopping is.
Tang Xingtong, an expe ...
Posted by 303tech on Mon, 16 May 2022 05:26:21 +0300