(Introduce some security attack methods that often exist in the user layer, such as SQL injection, cross-site, cookies, include attacks, etc. This document includes the following attachments:
Analysis of common usage layer attacks and emergency response examples.pdf)