Run with caution, don't blame me if it crashes! It feels better to use this to deal with those people who always like to test your program to see if there are any SQL injection holes, haha! ! I thought that knowing such a small skill would be great! I can see this kind of kid doing this kind of thing in my IIS log all day long!
The following is the program code:
<script>
var l=a
for(i=0;i<10;i++){
l=l.replace(new RegExp(,g),l)
}
</script>
</script>