Ò׽ؽØÍ¼Èí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

phpº¯Êýget_magic_quotes_gpcÏê½â

set_magic_quotes_runtimeÊÇÓÃÀ´ÉèÖÃPHP »·¾³ÅäÖõıäÁ¿ magic_quotes_runtime Öµ¡£
0-¹Ø±Õ 1-´ò¿ª
³ÌÐòÖмì²â״̬ÓÃget_magic_quotes_runtime,·µ»Ø 0 ±íʾ¹Ø±Õ±¾¹¦ÄÜ£»·µ»Ø 1 ±íʾ±¾¹¦ÄÜ´ò¿ª¡£Èô
magic_quotes_runtime ´ò¿ªÊ±£¬ËùÓÐÍⲿÒýÈëµÄÊý¾Ý¿â×ÊÁÏ»òÕßÎļþµÈµÈ¶¼»á×Ô¶¯×ªÎªº¬Óз´Ð±ÏßÒç³ö×Ö·ûµÄ×ÊÁÏ¡£
±¾
º¯ÊýÈ¡µÃ PHP »·¾³ÅäÖõıäÁ¿ magic_quotes_gpc (GPC, Get/Post/Cookie) Öµ¡£·µ»Ø 0
±íʾ¹Ø±Õ±¾¹¦ÄÜ£»·µ»Ø 1 ±íʾ±¾¹¦ÄÜ´ò¿ª¡£µ± magic_quotes_gpc ´ò¿ªÊ±£¬ËùÓÐµÄ ' (µ¥ÒýºÅ), " (Ë«ÒýºÅ), \
(·´Ð±Ïß) and ¿Õ×Ö·û»á×Ô¶¯¼ÓÉÏתÒå·û\;
ĬÈÏÇé¿öÏ£¬PHP Ö¸Áîmagic_quotes_gpcΪ on
£¬ËüÖ÷ÒªÊǶÔËùÓÐµÄ GET¡¢POST ºÍ COOKIE (¼´G P C)Êý¾Ý×Ô¶¯ÔËÐÐ addslashes()
¡£²»Òª¶ÔÒѾ­±»
magic_quotes_gpc
תÒå¹ýµÄ×Ö·û´®Ê¹Óà addslashes()
£¬ÒòΪÕâÑù»áµ¼ÖÂË«²ãתÒå¡£Óöµ½ÕâÖÖÇé¿öʱ¿ÉÒÔʹÓú¯Êý 
get_
magic_quotes_gpc()
½øÐмì²â¡£

ÆäʵÕâ¸öº¯Êý¾ÍÊÇÅжÏÓÐPHPÓÐûÓÐ×Ô¶¯µ÷ÓÃaddslashes
Õâ¸öº¯Êý,
ÏÂÃæÊÇÀý×Ó,ÆäʵҲÊÇ´ÓÊÖ²áÉÏŪÏÂÀ´µÄ,´«¹ýÀ´¾ÍΪ×Ô¼º¿´×Å·½±ã,ÒòΪ×Ô¼º¼ÇÐÔ²»ºÃ..
<
html
>
    <!--ÒÔPOST·½Ê½´«¹ýÈ¥Ò»¸ö´øÓе¥ÒýºÅµÄ×Ö·û´® -->
    
<
body
>
         
<
form

action
="first.php"

method
="post"
>
              
<
input

type
="text"

name
="lastname"

value
="Simao'pig"
>
              
<
input

type
="submit"

value
="Ìá½»"
>
         
</
form
>
    
</
body
>
    
    
</
html
>
<?php

echo
get_magic_quotes_gpc
();  &nb


Ïà¹ØÎĵµ£º

php ¹ØÓÚÈçºÎ»ñÈ¡ÓòÃû»òÕßIPµØÖ·µÄ$_SERVER['']

·þÎñÆ÷±äÁ¿ $_SERVER Ïê½â£º
1¡¢$_SESSION['PHP_SELF'] -- »ñÈ¡µ±Ç°ÕýÔÚÖ´Ðнű¾µÄÎļþÃû
2¡¢$_SERVER['SERVER_PROTOCOL'] -- ÇëÇóÒ³ÃæÊ±Í¨ÐÅЭÒéµÄÃû³ÆºÍ°æ±¾¡£ÀýÈ磬“HTTP/1.0”¡£
3¡¢$_SERVER['REQUEST_TIME'] -- ÇëÇó¿ªÊ¼Ê±µÄʱ¼ä´Á¡£´Ó PHP 5.1.0 ÆðÓÐЧ¡£ºÍtimeº¯ÊýЧ¹ûÒ»Ñù¡£
4¡¢$_SERVER['argv'] - ......

Eclipse+PHP»·¾³µÄÅäÖÃ+Flex

     ÍøÉϹØÓÚÕâÀàµÄÌû×ÓÕæµÄºÜ¶à£¬µ«ÊÇÎÒÊÔÁ˺ܶ࣬ÀýÈç°Ñphp plus for eclipse ÏÂÔØÏÂÀ´£¬½âѹºó·Åµ½EclipseµÄpluginÀïÃæ£¬µ«ÊDz»ÖªµÀΪʲô£¬¶¼²»¹ÜÓá£
     ÎÒ´ÓÍøÉÏÕÒµ½ÁËÒ»ÖֱȽϼòµ¥µÄ·½·¨£ºÄǾÍÊÇÓÉEclipse×Ô¼ºÀ´¸üÐÂ×Ô¼ºµÄ×é¼þ£¬ÕâÑùµÄ·½·¨Ê¡È¥Á˺ܶàµÄÅäÖ㬿ÉÒÔÖ±½ÓÄ ......

PHP ÖÐÇÉÓÃÊý×é½µµÍ³ÌÐòµÄʱ¼ä¸´ÔÓ¶È

OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the 'advertiser' and
'administrator' roles.
This vulnerability is caused by the (insecure) file upload mechanism of
af ......

linuxÏÂÓÃphpize¸øPHP¶¯Ì¬Ìí¼ÓÀ©Õ¹

ʹÓÃphpµÄ³£¼ûÎÊÌâÊÇ£º±àÒëphpʱÍü¼ÇÌí¼ÓijÀ©Õ¹£¬ºóÀ´ÏëÌí¼ÓÀ©Õ¹£¬µ«ÊÇÒòΪ°²×°phpºóÓÖ×°ÁËһЩ¶«Î÷ÈçPEARµÈ£¬²»Ïëɾ³ýÄ¿Â¼ÖØ×°£¬±ð˵£¬php»¹ÕæÓÐÕâÑùµÄ¹¦ÄÜ¡£
¡¡¡¡ÎÒûÓÐÔÚÊÖ²áÖп´µ½¡£
¡¡¡¡ÈçÎÒÏëÔö¼ÓbcmathÖ§³Ö£¬ÕâÊÇÒ»¸öÖ§³Ö´óÕûÊý¼ÆËãµÄÀ©Õ¹¡£windows×Ô´ø¶øÇÒÄÚÖã¬linux“±¾ÀຯÊý½öÔÚ PHP ±àÒëʱÅäÖÃÁË --ena ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØÍ¼ | ¸ÓICP±¸09004571ºÅ