- 更多网络例句与漏洞相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Through the source code audit such as RATS software can find the flaw information of level of partial source code, but after all the majority that software of source code audit searchs spills over for the existence buffer such as Strcpymemcpy the C function that involuntary discharge of urine has, the measure that adopts audit source code so will undertake flaw is dug is coefficient of a possibility very small leak digs a technology, and the flaw that although also can find a few software,checks in the light of the black box of software, but possibility coefficient also is met lesser, a few undertakes flaw is dug idea that are in abroad already slowly promotion writes black box to check code for oneself, the module of a certain function that is aimed at system or software next undertakes modular flaw digs a technology.
通过RATS等源代码审计软件可以找到部分源代码级别的漏洞信息,但是究竟源代码审计软件寻找的多数为strcpymemcpy等存在缓冲区溢出遗患的C函数,所以通过审计源代码的办法来进行漏洞挖掘是一个可能性系数很小的漏洞挖掘技术,而针对软件的黑盒子测试虽然也能找到一些软件的漏洞,但可能性系数也会较小,在国外的一些进行漏洞挖掘的办法已经慢慢的提升为自己写黑盒子测试代码,然后针对系统或软件的某个功能模块进行模块化的漏洞挖掘技术。
-
In this context, we studied the class and disserve of web application security vulnerability and compared the static vulnerability test to the dynamic vulnerability test.
本文在这样的背景下研究了Web应用安全漏洞的种类和危害并对静态漏洞检测技术和动态漏洞检测技术进行了比较和评价,指出动态漏洞测试技术是最适合于Web应用的安全漏洞测试的方法。
-
Known weaknesses in systems are called Common Vulnerabilities and Exposures, compiled and documented by the MITRE organization.
系统上已知的漏洞被称为"通用漏洞批露",它是由MITRE组织汇编整理的漏洞信息。
-
In order to reduce the time of analyzing the scan report of Nessus, we designed an analyzer of vulnerability scanning report, the analyzer includes two parts: one worksheet is used to reveal the classification of vulnerability; the other is used to show the related information of the host, such as IP address, port numbers, detailed vulnerability information, grades of risk and related solving schemes.
NSR格式的漏洞扫描报告进行改进,设计并实现了一个漏洞报告分析器,该漏洞报告分析器包括两部分内容,除了用来简要的显示主机漏洞分类的工作表外,还有一个显示主机的相关信息的工作表,例如主机IP地址,端口号,漏洞详细信息,风险等级以及相关的解决方案等,该应用程序减少了分析漏洞报告数据所需要的时间,减轻了网络维护人员的工作量。
-
In the test, HSPS is tested by making use of venerability of .printer remote buffer overflow, Unicode, and .ida remote buffer overflow.
在实验中,利用。printer远程缓冲区溢出漏洞,Unicode漏洞,。ida远程缓冲区溢出漏洞对HSPS进行了测试。
-
This paper (from 4-6) analyzes the fundamental theories and the civil characteristics of analogical reasoning, restrictive /extensive interpretation of purposiveness and legal fiction in details, simultaneously, it analyzes the multiple framework of compensating for legal loopholes with civil norms in the process of all kinds of concrete methods of the loophole-filling by examples, more importantly, under the multiple framework\'s guidance, it tries its best to construct the process of compensating for legal loopholes with civil norms in the process of all kinds of concrete methods of the loophole -filling.
上述三个方面,特别是第二、三个方面共同构成了论文分述具体漏洞补充方法与民间规范关联性的理论基础。论文详细地分析了类推适用、目的性限缩、目的性扩张和法律拟制等具体漏洞补充方法的基本理论问题、民间法性和在各种具体漏洞补充方法中以各种类型的民间规范填补法律漏洞的法社会学——规范实证的复合分析过程。更为重要的是,以上述复合的分析框架为指导,在判例阅读基础上,本文力图建构出这一过程具体的、真实的面向来。
-
Then the first kernel exploit would stay unrevealed and available for future development work.
译者注:所谓第一个核心漏洞应该来自于爆冲赛车,但是这个漏洞没有被公布,新核心漏洞是Davee提出来的
-
My point was that since there is a NEW kernel exploit, Miriam or somebody else could release a HEN now based on this new kernel exploit AND Gripshift user exploit.
我的观点是既然有一个新的核心漏洞,Miriam或其它人在这个新的核心漏洞和爆冲赛车用户模式漏洞上可以释出一个HEN ,那么第一个核心漏洞就可以不公布,而且以后的开发工作中也用的着。
-
Hackers complain that, if they go to such companies to try to ascertain what represents a fair price, the value of their information plummets because too many people now know about it.
黑客抱怨,如果他们向其咨询漏洞信息合适的价格,则会有过多的人知道关于漏洞的信息,因此漏洞就不值钱了。
-
The corresponding color weighted diagraph was setup in dependence on the inference relation of the security holes in the intruded machine. With the vulnerability-log relation matrix, we searched different forensic information source and got the corresponding support value which could help to prune the false relation between the nodes and get the remote suspicious host. Then analyzing the suspicious host in the same way.
以漏洞间推理关系为前提,从受害主机入手,构造有色加权有向图,在多日志中查找漏洞被利用的解释信息,并由查找结果对漏洞链动态剪枝,得到主机漏洞攻击链和攻击该受害主机的嫌疑主机,对嫌疑主机迭代分析,推理出网络漏洞攻击链。
- 更多网络解释与漏洞相关的网络解释 [注:此内容来源于网络,仅供参考]
-
Microsoft Excel BIFF:文件格式解析栈溢出漏洞
Microsoft Excel日历对象验证远程代码执行漏洞(MS08-057) | Microsoft Excel BIFF文件格式解析栈溢出漏洞(MS08-057) | Microsoft Excel公式解析整数溢出漏洞(MS08-057)
-
Chilkat XML ActiveX:控件不安全方式调用漏洞
Advanced Electron Forum preg_replace调用远程代码执行漏洞 | Chilkat XML ActiveX控件不安全方式调用漏洞 | NMS DVD Burning SDK ActiveX控件任意文件覆盖漏洞
-
leak detecting system:漏洞检测系统
防信息泄漏:Information leak prevention | 漏洞检测系统:leak detecting system | 锅炉漏风:boiler"s air leak
-
Microsoft Excel:日历对象验证远程代码执行漏洞
Microsoft Windows多个内核权限提升漏洞(MS08-061) | Microsoft Excel日历对象验证远程代码执行漏洞(MS08-057) | Microsoft Excel BIFF文件格式解析栈溢出漏洞(MS08-057)
-
Microsoft Excel:公式解析整数溢出漏洞
Microsoft Excel BIFF文件格式解析栈溢出漏洞(MS08-057) | Microsoft Excel公式解析整数溢出漏洞(MS08-057) | Microsoft Office CDO协议跨站脚本漏洞(MS08-056)
-
Horde MIME:附件文件名跨站脚本漏洞
Horde MIME附件文件名跨站脚本漏洞 | Attachmax多个输入验证漏洞 | libxml XML实体名堆溢出漏洞
-
windows metafile:堆远程溢出漏洞
4) Microsoft Windows logon远程缓冲区溢出漏洞 | 5) Windows Metafile堆远程溢出漏洞 | 6) Microsoft Windows Help和Support中心远程命令执行漏洞
-
Novell eDirectory Nessus:远程拒绝服务漏洞
Novell eDirectory eMBoxClient.jar本地敏感信息泄露漏洞 | Novell eDirectory Nessus远程拒绝服务漏洞 | SquirrelMail compose.php多个信息泄露及数据修改漏洞
-
Sun Solaris:安装补丁后存在安全漏洞
9. OpenBSD httpd 访问规则绕过设置漏洞 | 11.Sun Solaris安装补丁后存在安全漏洞 | II. 本月重要安全漏洞描述
-
Scan vulnerabilities:掃描漏洞
Portscan the network for vulnerable computers 用port 掃描有漏洞的電腦 | Scan vulnerabilities 掃描漏洞 | Start ftpd 啟動 ftpd 服務