Ò׽ؽØÍ¼Èí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

²»´íµÄphp·Ö²¼Àà

<?php
function genpage(&$sql,$page_size=10)
{
      global $pages,$sums,$eachpage,$page; //×ÜÒ³Êý£¬×ܼǼ£¬Ã¿Ò³Êý£¬µ±Ç°Ò³
      $page = $_GET["page"];
   if($page ==0)$page =1;
      $eachpage = $page_size;
      $pagesql = strstr($sql," from ");
      $pagesql = "select count(*) as ids ".$pagesql;
      $conn = mysql_query($pagesql) or die(mysql_error());
      if($rs = mysql_fetch_array($conn))$sums = $rs[0];
     
      $pages=ceil($sums/$eachpage);
   if($pages==0)$pages=1;
  
      $startpos = ($page-1)*$eachpage;
      $sql .=" limit $startpos,$eachpage ";
}
//ÏÔʾ·ÖÒ³
function showpage()
{
 global $pages,$sums,$eachpage,$page; //×ÜÒ³Êý£¬×ܼǼ£¬Ã¿Ò³Êý£¬µ±Ç°Ò³£¬ÆäËü²ÎÊý
    $link=$_SERVER['PHP_SELF']; 
 
echo "¼Ç¼".$sums.":".$eachpage."¡¡";
echo "Ò³Êý".$page."/".$pages."¡¡";
$p_head=$page-5;
if($p_head<=0)$p_head=1;   //Ò³ÂëÑ­»·¿ªÊ¼Êý ǰ5¸ö
$p_end=$page+5;
if($p_end>$pages)$p_end=$pages;   //Ò³ÂëÑ­»·½áÊøÊý ºó5¸ö
echo "[<a href=$link?page=1>Ê×Ò³</a>] ";
 for($i=$p_head;$i<=$p_end;$i++)
 {
 if($i!=$page)
  echo "<a href=$link?page=$i>[$i]</a> ";
 else
  echo "<b><strike>[$i]</strike></b> ";
 }
echo " [<a href=$link?page=$pages>ĩҳ</a>]";
}
?>


Ïà¹ØÎĵµ£º

phpºÍjavaÉÏ´«ÎļþµÄ·½·¨

javaÉÏ´«Îļþ
ÐèÒªµÄµÚÈý·½jar°üÓУ¨ÕâÀïʹÓÃapacheµÄ£©
apacheµÄcommons-fileupload£¨ÉÏ´«Óã©£¬commons-io £¨listenerÇåÀíÀàÓã© £¬ commons-beanutils£¨¿ÉÑ¡£©
¾ßÌå²Ù×÷
FileItemFactory factory = new DiskFileItemFactory();
ServletFileUpload upload = new ServletFileUpload(factory);
if(ServletFileUp ......

PHPº¯ÊýstrtotimeÏê½â

 strtotimeº¯ÊýÊÇÒ»¸öºÜºÃµÄº¯Êý,Áé»îµÄÔËÓÃËü,»á¸øÄãµÄ¹¤×÷´øÀ´²»ÉÙ·½±ã.µ«PHPµÄÊÖ²áÖÐÈ´¶Ô´Ëº¯ÊýµÄ²ÎÊýû×÷Ì«¶à½éÉÜ,¶ÔЩº¯ÊýµÄÆäËû½éÉÜÒ²·Ç³£ÉÙ¡£
ÏÈ¿´ÊÖ²á½éÉÜ£º
strtotime — ½«ÈκÎÓ¢ÎÄÎı¾µÄÈÕÆÚʱ¼äÃèÊö½âÎöΪ Unix ʱ¼ä´Á
¸ñʽ£ºint strtotime ( string $time [, int $now ] )
¡¡¡¡±¾º¯ÊýÔ¤ÆÚ½ÓÊÜÒ ......

PHP ÖÐÇÉÓÃÊý×é½µµÍ³ÌÐòµÄʱ¼ä¸´ÔÓ¶È

OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the 'advertiser' and
'administrator' roles.
This vulnerability is caused by the (insecure) file upload mechanism of
af ......

PHP tempname()º¯ÊýÈÆ¹ýsafe_mode°²È«ÏÞÖÆÂ©¶´

BUGTRAQ ID: 36555
CVE ID: CVE-2009-3557
PHPÊǹ㷺ʹÓõÄͨÓÃÄ¿µÄ½Å±¾ÓïÑÔ£¬ÌرðÊʺÏÓÚWeb¿ª·¢£¬¿ÉǶÈëµ½HTMLÖС£
PHPµÄtempnam()ÖеĴíÎó¿ÉÄÜÔÊÐíÈÆ¹ýsafe_modeÏÞÖÆ¡£ÒÔÏÂÊÇext/standard/file.cÖеÄÓЩ¶´´úÂë¶Î£º
PHP_FUNCTION(tempnam)
{
char *dir, *prefix;
int dir_len, prefix_len;
size_t p_len;
char ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØÍ¼ | ¸ÓICP±¸09004571ºÅ