zoukankan      html  css  js  c++  java
  • 项目相关

    my_name
    XB
    ID
    ADDRESS
    tel
    qq
    note

    //显示表所有的项的自断的类型和大小
    mysql> show full columns from hdxcy_info;
    +-----------+--------------+-------------------+------+-----+---------+------
    --------------------------------+---------+
    | Field | Type | Collation | Null | Key | Default | Extra
    Privileges | Comment |
    +-----------+--------------+-------------------+------+-----+---------+------
    --------------------------------+---------+
    | XcyName | varchar(18) | gb2312_chinese_ci | NO | PRI | NULL |
    select,insert,update,references | |
    | sex | varchar(4) | gb2312_chinese_ci | NO | | NULL |
    select,insert,update,references | |
    | ID | varchar(20) | gb2312_chinese_ci | NO | | NULL |
    select,insert,update,references | |
    | address | varchar(100) | gb2312_chinese_ci | NO | | NULL |
    select,insert,update,references | |
    | Telephone | varchar(20) | gb2312_chinese_ci | NO | | NULL |
    select,insert,update,references | |
    | QQ | varchar(15) | gb2312_chinese_ci | YES | | NULL |
    select,insert,update,references | |
    | beizhu | varchar(50) | gb2312_chinese_ci | YES | | NULL |
    select,insert,update,references | |
    +-----------+--------------+-------------------+------+-----+---------+------
    --------------------------------+---------+
    7 rows in set (0.26 sec)

    mysql>

     //蓝色部分解决了:以图片做按钮提交表单数据的问题

    <input type="image" src="image/tj.gif" onClick="check()">

    <script language="javascript">
    function check()
    {
    document.form.submit();
    }
    </script>

  • 相关阅读:
    Weblogic 漏洞利用总结
    CVE-2017-9993 FFMpeg漏洞利用
    tomcat漏洞利用总结
    移动渗透测试杂记
    CORS漏洞利用检测和利用方式
    discuz mlv3.x命令注入
    DNS域传输漏洞利用总结
    redis未授权漏洞和主从复制rce漏洞利用
    CVE-2016-3714-ImageMagick 漏洞利用
    JAVA WEB EL表达式注入
  • 原文地址:https://www.cnblogs.com/yuhuameng/p/3766024.html
Copyright © 2011-2022 走看看