The previous article introduced you to "How to upload files in PHP? What do we need to pay attention to? 》, this article continues to introduce to you what are the vulnerabilities of commonly used functions in PHP? It has certain reference value. Friends in need can refer to it. I hope it will be helpful to everyone.
Vulnerabilities in commonly used functions in PHP:
-
extract variable coverage vulnerability
extract function: Import variables from the array into the current symbol table. It can be found in some mvc frameworks
Extract function definition: int extract(array,extract_ rules,prefix)
extract0 The function will check whether each key name is a legal variable name and also checks whether it conflicts with an existing variable name in the symbol table. The handling of illegal and conflicting key names will be determined based on this parameter.
extract_rules :
EXTR_ OVERWRITE - Default. If there is a conflict, existing variables are overwritten.
EXTR_ SKIP - If there is a conflict, do not overwrite existing variables.
EXTR_ PREFIX. SAME - If there is a conflict, add a prefix to the variable name.
EXTR_ PREFIX. ALL - Give all variable names Prefix prefix.
EXTR_ PREFIX. INVALID - Prefix only illegal or numeric variable names with prefix.
- ##EXTR_ IF. EXISTS - Overwrites the values of variables with the same name only if they already exist in the current symbol table. Others are not processed.
- EXTR_PREFIX_IF _EXISTS - Only when a variable with the same name already exists in the current symbol table. Create a variable name with a prefix attached and nothing else will be processed.
- EXTR_REFS - Extract variables as references. The imported variable still references the value of the array parameter.
<?php $name = '好久不见'; echo $name; ?>The code result is as follows:
<?php $name = '好久不见'; extract(array('name'=>'再见')); echo $name; ?>The code result is as follows:
PHP video tutorial"
The above is the detailed content of What are the vulnerabilities of commonly used functions in PHP?. For more information, please follow other related articles on the PHP Chinese website!

php把负数转为正整数的方法:1、使用abs()函数将负数转为正数,使用intval()函数对正数取整,转为正整数,语法“intval(abs($number))”;2、利用“~”位运算符将负数取反加一,语法“~$number + 1”。

实现方法:1、使用“sleep(延迟秒数)”语句,可延迟执行函数若干秒;2、使用“time_nanosleep(延迟秒数,延迟纳秒数)”语句,可延迟执行函数若干秒和纳秒;3、使用“time_sleep_until(time()+7)”语句。

extract函数是PHP中一个非常实用的函数,它可以将一个数组中的键值对赋值给一组变量。采用这种方式,我们可以简化代码,并且提供更直观的变量名称,方便维护和调试。本文将介绍如何使用PHP中的extract函数将数组键值赋值给变量。一、extract函数的语法extract函数的语法非常简单,如下所示:extract(array$array,int$f

php除以100保留两位小数的方法:1、利用“/”运算符进行除法运算,语法“数值 / 100”;2、使用“number_format(除法结果, 2)”或“sprintf("%.2f",除法结果)”语句进行四舍五入的处理值,并保留两位小数。

php字符串有下标。在PHP中,下标不仅可以应用于数组和对象,还可应用于字符串,利用字符串的下标和中括号“[]”可以访问指定索引位置的字符,并对该字符进行读写,语法“字符串名[下标值]”;字符串的下标值(索引值)只能是整数类型,起始值为0。

判断方法:1、使用“strtotime("年-月-日")”语句将给定的年月日转换为时间戳格式;2、用“date("z",时间戳)+1”语句计算指定时间戳是一年的第几天。date()返回的天数是从0开始计算的,因此真实天数需要在此基础上加1。

在php中,可以使用substr()函数来读取字符串后几个字符,只需要将该函数的第二个参数设置为负值,第三个参数省略即可;语法为“substr(字符串,-n)”,表示读取从字符串结尾处向前数第n个字符开始,直到字符串结尾的全部字符。

方法:1、用“str_replace(" ","其他字符",$str)”语句,可将nbsp符替换为其他字符;2、用“preg_replace("/(\s|\ \;||\xc2\xa0)/","其他字符",$str)”语句。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Dreamweaver Mac version
Visual web development tools

SublimeText3 Chinese version
Chinese version, very easy to use

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft
