PHP is great for being able to easily create web apps that work. The problem is that it also easy to create code with major vulnerabilities that is a mess to read and try to audit. Many times PHP is used by desktop support technicians to create apps to track department inventory, or work orders that after a few years get coopted by the rest of the company and are being used at a scale never envisioned when the technician was copy/ pasting from a dummies book to make the code work.
The shell_exec() function allows you to send commands to the Command Line using PHP. You can use this for everything from pinging websites, to calling installed apps such as FFMPEG. shell_exec() also returns the results […]
You can send Variable Names and Values using hyperlinks to PHP Scripts. This is an easy way to send variable data, but is incredibly insecure. To send a variable to a PHP script add ?variable_name=variable_value […]
The explode() function allows you to turn a String into an Array based on a separator you define. explode() https://www.php.net/manual/en/function.explode.php https://www.w3schools.com/php/func_string_explode.asp explode.php