Summary of common PHP code auditing vulnerabilities, simple things, and bad things. You are welcome to point out that continuous learning and research can make continuous progress and stick to it, you will understand it one day. 1. the SQL injection vulnerability may exist in all areas that interact with the database. 2. file Inclusion Vulnerability include/include_once/require/require_once 3. XSS Cross-Site vulnerability check whether string input/output is processed 4. code Execution Vulnerability: PHP code execution vulnerability. Common vulnerabilities occur in dangerous functions. eval/preg_replace /... 5. Command Execution Vulnerability command execution vulnerability. Common vulnerabilities occur in dangerous functions. system/exec /... 6. this type of logical error vulnerability is widely used. It mainly depends on the programmer's ability to understand the Code. For example, a typical variable overwrites foreach (Array ('_ get',' _ Post ', '_ cookier') as $ _ request) {foreach ($ _ request as $ _ k => $ _ v) $ {$ _ k} = _ xxoo ($ _ v);} 7. doS Vulnerability exif_read_data/Glob /... 8. Variable Overwrite Vulnerability variable overwrite mainly triggers parse_str/$/mb_parse_str/… between logic problems and related sensitive functions /... 9. arbitrary File Reading is usually caused by File Read filtering, or file_get_contents/readfile /.. 10. arbitrary File Download www.2cto.com, which is common, is not strictly filtered. 11. arbitrary File Deletion is not strictly filtered. related sensitive functions include unlink/delete/session_destroy /.. 12. any file upload file type is not strictly filtered. For code logic problems, pay attention to move_uploaded_file 13. arbitrary File Write File write filtering loose file_put_contents/fwrite /.. 14. malformed Directory Creation often occurs when the Created directory is not filtered, which may easily lead to the creation of malformed directories, resulting in parsing vulnerability rename/mkdir /.. 15. COOKIE/SESSION spoofing mainly depends on the login authentication and permission verification methods. Sometimes, we can modify the cookie and change the role 16. the unauthorized operation vulnerability also involves permission verification. It is common for many programs to modify their own passwords. L The where = value after the statement is placed in the form. We can modify the value to achieve the effect of excessive permission....