php¶ÔzipÎļþ½âѹºÍѹËõ
	
    
    
	<?php
/**
 * @author wyt
 * 
 */
class zip  {
	private $_zipObj=null;
	private $_zipfcArr=array();
	private $_basePath=null;
	private $_zipName;
	/**
	 * init 
	 * @param zipÎļþÃû³Æ $zipName
	 */
	function __construct($zipName){
		$this->_zipName=$zipName;
		$this->_zipObj=new rezip();
	}
	
	/**
	 * ѹËõÒ»¸öÎļþ¼Ð
	 * @param Ŀ¼Ãû³Æ $path
	 */
	public function tozip($path){
		$this->_basePath=$path;
		$this->_basePath.='/';
		$this->direct($path);
		$this->_zipObj->Add($this->_zipfcArr,1); 
		//дÈëÎļþ
		if(@fputs(@fopen($this->_zipName,"wb"),$this->_zipObj->get_file())) return $this->_zipName;
		return false; 
	}
	
	/**
	 * ½âѹzipÎļþ
	 * @param ½âѹµ½µÄÎļþ¼Ð $destPath
	 */
	public function unzip($destPath){
		if(!file_exists($destPath)) @mkdir($destPath,0777,true);
		return $this->_zipObj->Extract($this->_zipName,$destPath);
	}
			
	function direct($path){
		$handler=opendir($path);
		while(($file=readdir($handler))!==false){
			if($file=='.'||$file=='..') continue;
			$tmp=$path.'/'.$file;
			$filename=str_replace($this->_basePath,'',$tmp); 
			if(is_dir($tmp)){
				$this->direct($tmp);
			}else{
				//Éú³ÉµÄzip ÎļþÃû
				echo $tmp."\n";	 
				$filesize=@filesize($tmp); 
				$fp=@fopen($tmp,rb); 
				$this->_zipfcArr[]=Array($filename,@fread($fp,$filesize));  
				@fclose($fp);			
			}
		}
		closedir($handler);
	}
}
 /**
  * ѹËõÀ࣬½øÐÐÁËССµÄ¸Ä¶¯
  *
  */
class rezip{
 var $datasec, $ctrl_dir = array();
 var $eof_ctrl_dir = "\x50\x4b\x05\x06\x00\x00\x00\x00";
 var $old_offset = 0; var $dirs = Array(".");
 function get_List($zip_name){
	   $zip = @fopen($zip_name, 'rb');
	   if(!$zip) return(0);
	   $centd = $this->ReadCentralDir($zip,$zip_name);
	
	    @rewind($zip);
	    @fseek($zip, $centd['offset']);
	
	   for ($i=0; $i<$centd['entries']; $i++){
	    $header = $this->Re
    
     
	
	
    
    
	Ïà¹ØÎĵµ£º
        
    
    ת×Ô±¾È˸öÈËÍøÕ¾ ¡¾PHP̽·Õß
¡¿£¬»¶Ó¸÷λ·ÃÎÊÕ¾µã£¡
ÔÚʹÓÃPHP»ñÈ¡ä¯ÀÀÆ÷ÐÅϢʱ£¬Í¨³£ÓÐÁ½ÖÖ·½Ê½£º
µÚÒ»ÖÖÊÇ£ºÊ¹ÓÃ$_SERVER[HTTP_USER_AGENT]Ñ¡Ïî
´Ë·½Ê½»ñÈ¡µÄÊǸñʽ²»¹æÔòµÄÊý¾Ý£¬Èç 
Mozilla/4.0 (compatible; MSIE 8.0
; Windows NT 5.1; Trident/4.0; GTB6; CIBA; .NET CLR 2.0.50727)
Mozilla/5.0 (Windows ......
	
    
        
    
    ÔÚPHP½øÐÐÐòÁл¯Ê±£¬serialize() ¼ì²éÀàÖÐÊÇ·ñÓÐ __sleep() ,Èç¹ûÓУ¬Ôò¸Ãº¯Êý½«ÔÚÈκÎÐòÁл¯Ö®Ç°ÔËÐС£¸Ãº¯Êý±ØÐë·µ»ØÒ»¸öÐèÒª½øÐÐÐòÁл¯±£´æµÄ³ÉÔ±ÊôÐÔÊý×飬²¢ÇÒÖ»ÐòÁл¯¸Ãº¯Êý·µ»ØµÄÕâЩ³ÉÔ±ÊôÐÔ. ¸Ãº¯ÊýÓÐÁ½¸ö×÷ÓÃ: µÚÒ». ÔÚÐòÁл¯Ö®Ç°,¹Ø±Õ¶ÔÏó¿ÉÄܾßÓеÄÈκÎÊý¾Ý¿âÁ¬½ÓµÈ. µÚ¶þ. Ö¸¶¨¶ÔÏóÖÐÐèÒª±»ÐòÁл¯µÄ³ÉÔ±ÊôÐÔ,È ......
	
    
        
    
    MySQL+PHP²úÉúÂÒÂëÔÒò£º
¡¡¡¡¡ô MySQLÊý¾Ý¿âĬÈϵıàÂëÊÇutf8,Èç¹ûÕâÖÖ±àÂëÓëÄãµÄPHPÍøÒ³²»Ò»ÖÂ,¿ÉÄܾͻáÔì³ÉMySQLÂÒÂë;
¡¡¡¡¡ô MySQLÖд´½¨±íʱ»áÈÃÄãÑ¡ÔñÒ»ÖÖ±àÂë,Èç¹ûÕâÖÖ±àÂëÓëÄãµÄÍøÒ³±àÂë²»Ò»ÖÂ,Ò²¿ÉÄÜÔì³ÉMySQLÂÒÂë;
¡¡¡¡¡ô MySQL´´½¨±íʱÌí¼Ó×Ö¶ÎÊÇ¿ÉÒÔÑ¡Ôñ±àÂëµÄ,Èç¹ûÕâÖÖ±àÂëÓëÄãµÄÍøÒ³±àÂë²»Ò»ÖÂ,Ò²¿ÉÄÜÔì³É ......
	
    
        
    
    OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the 'advertiser' and
'administrator' roles.
This vulnerability is caused by the (insecure) file upload mechanism of
af ......
	
    
        
    
    set_magic_quotes_runtimeÊÇÓÃÀ´ÉèÖÃPHP »·¾³ÅäÖõıäÁ¿ magic_quotes_runtime Öµ¡£
            0-¹Ø±Õ 1-´ò¿ª
³ÌÐòÖмì²â״̬ÓÃget_magic_quotes_runtime,·µ»Ø 0 ±íʾ¹Ø±Õ±¾¹¦ÄÜ£»·µ»Ø 1 ±íʾ±¾¹¦ÄÜ´ò¿ª¡£Èô
magic_quotes_runtime ´ò¿ªÊ±£¬ËùÓÐÍⲿÒýÈëµÄÊý¾Ý¿â×ÊÁÏ»òÕßÎļþµÈµÈ¶¼»á×Ô¶¯×ªÎªº¬Óз´Ð±ÏßÒç³ö×Ö·ûµÄ×ÊÁÏ¡ ......