From 78f7180b5007dd77422dce1a39eada5d4beb17f8 Mon Sep 17 00:00:00 2001 From: taest <876239615@qq.com> Date: Sun, 9 Oct 2022 02:17:15 +0000 Subject: [PATCH] =?UTF-8?q?=E9=94=99=E8=AF=8D=E4=BF=AE=E6=94=B9?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: taest <876239615@qq.com> --- Architecture.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Architecture.md b/Architecture.md index f397bbf..6941944 100644 --- a/Architecture.md +++ b/Architecture.md @@ -3800,7 +3800,7 @@ select * from staff where name='' or '1'='1'; JSON反序列化漏洞——如Fastjson安全漏洞。 -### 什么是JSON序列化,JSON发序列化 +### 什么是JSON序列化,JSON反序列化 - 序列化:把对象转换为字节序列的过程 - 反序列:把字节序列恢复为Java对象的过程