Java sec code is a very powerful and friendly project for learning Java vulnerability code.
This project can also be called Java vulnerability code.
Each vulnerability type code has a security vulnerability by default unless there is no vulnerability. The relevant fix code is in the comments or code. Specifically, you can view each vulnerability code and comments.
Due to the server expiration, the online demo site had to go offline.
Login username & password:
Sort by letter.
The application will use mybatis auto-injection. Please run mysql server ahead of time and configure the mysql server database's name and username/password except docker environment.
spring.datasource.url=jdbc:mysql://127.0.0.1:3306/java_sec_code spring.datasource.username=root spring.datasource.password=woshishujukumima
docker-compose pull docker-compose up
git clone https://github.com/JoyChou93/java-sec-code
git clone https://github.com/JoyChou93/java-sec-code&
mvn clean package.
<groupId>sec</groupId> <artifactId>java-sec-code</artifactId> <version>1.0.0</version> <packaging>war</packaging>
Build package and run.
git clone https://github.com/JoyChou93/java-sec-code cd java-sec-code mvn clean package -DskipTests java -jar target/java-sec-code-1.0.0.jar
If you are not logged in, accessing any page will redirect you to the login page. The username & password are as follows.
Tomcat's default JSESSION session is valid for 30 minutes, so a 30-minute non-operational session will expire. In order to solve this problem, the rememberMe function is introduced, and the default expiration time is 2 weeks.
If you like the poject, you can donate to support me. With your support, I will be able to make
Java sec code better 😎.
Scan the QRcode to support
Java sec code.