一,局部代码块
存在于方法里面(必须调用方法才可以)
public class Person{ public void run(){ System.out.println("局部代码块"); } }
二,构造代码块
public class Person{ { System.out.println("构造代码块"); } }
三,静态代码块
public class Person{ static { System.out.println("静态代码块"); } }
四,同步代码块
synchronized(this) { }
五,四种代码块执行顺序
静态代码块-->构造代码块-->构造函数-->局部代码块-->同步代码块
ecshop /pick_out.php SQL Injection Vul By Local Variable Overriding
dedecms /include/filter.inc.php Local Variable Overriding
dedecms plusguestbook.php SQL Injection Vul By plusguestbookedit.inc.php
帝国备份王(Empirebak) classfunctions.php、classcombakfun.php GETSHELL vul
dedecms /member/uploads_edit.php SQL Injection Vul
PHP Lex Engine Sourcecode Analysis(undone)
dedecms /member/resetpassword.php SQL Injection Vul
dedecms /member/reg_new.php SQL Injection Vul
dedecms /member/pm.php SQL Injection Vul
- 最新文章
-
Linux Running State Process ".so"、"code" Injection Technology
Windows、Linux下文件操作(写、删除)错误的产生原因、及解决方法
Security Access Control Strategy && Method And Technology Research
Linux VFS Extended Attribute And Access Control Table
Non Lasting Storage File System、procfs、sysfs
Ext FileSystem Family、Ext2、Ext3
ELF Executable Reconstruction From A Core Image
PHP FastCGI RCE Vul
Linux Module
Linux Device Driver && Device File
- 热门文章
-
主机宝(zhujibao) /a/apps/zhujibao/manager/apps/config/config.php no-password Login Vulnerabilities Based On Default cookie Verification From Default File
osquery An Operating System Instrumentation Framewor
Discuz! X2.5 /source/class/helper/helper_seo.php Remote Code Execution Vul
Discuz! x3.1 /utility/convert/index.php Code Execution Vul
ecshop /category.php SQL Injection Vul
ecshop /includes/init.php Arbitrary User Login Vul
ecshop /search.php SQL Injection Vul
ecshop /api/client/api.php、/api/client/includes/lib_api.php SQL Injection Vul
ecshop /flow.php SQL Injection Vul
ecshop /includes/modules/payment/alipay.php SQL Injection Vul
Copyright © 2011-2022 走看看