• AppDetectivePro has long set the standard for database vulnerability scanning, assessment and compliance capabilities.

    AppDetectivePro早已确立数据库脆弱性扫描评估履约能力标准

    youdao

  • Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.

    这个数据库中的每个条目包含安全漏洞简要说明相关参考资料

    youdao

  • This is much different from a traditional "vulnerability database" that documents known bugs in off-the-shelf software.

    很大程度区别于传统的“弱点数据库”。

    youdao

  • The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.

    MySQL默认安装特别是密码空缺缓冲区溢出潜在漏洞使得这个数据库服务器成为容易攻击目标

    youdao

  • Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.

    最后是三个漏洞个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞最后利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。

    youdao

  • It can be said that as long as people are still writing database applications, SQL injection vulnerability will always exist.

    可以说只要人类在编写数据库应用SQL注入漏洞就会一直存在

    youdao

  • In this article, I'll discuss the two that have provided the most value to my organization: the National Vulnerability Database and the National Cyber Alert System.

    篇文章里,讨论提供组织最有价值个:国家漏洞数据库国家网络报警系统。

    youdao

  • The research on computer vulnerabilities and the building of the vulnerability database are significant in improving system's security and reducing computer security incidents.

    计算机系统安全漏洞研究以及漏洞建设对于提高系统安全性减少安全事件发生具有重要意义。

    youdao

  • The research on computer vulnerabilities and the building of the vulnerability database are significant for improving system's security and reducing computer security incidents.

    计算机系统安全漏洞研究以及漏洞建设对于提高系统安全性减少安全事件发生具有重要意义。

    youdao

  • The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.

    安全漏洞分类漏洞设计计算机安全漏洞研究基础

    youdao

  • The software includes three subsystems: database system, aircraft target vulnerability model system and graphics visualization module.

    软件包括数据库系统易损性评估系统可视化模块三大子系统。

    youdao

  • This 1.6 version fixes a critical security vulnerability. 3, this version is not compatible with previous versions of the database.

    1.6版本修补了一个致命安全漏洞3这个版本兼容以前版本数据库

    youdao

  • Computer vulnerability database has been an important part of vulnerability research, and it is greatly significant for collecting, storing and organizing vulnerability information.

    计算机弱点数据库成为弱点研究重要组成部分收集存储组织弱点信息具有重要意义

    youdao

  • Computer vulnerability database has been an important part of vulnerability research, and it is greatly significant for collecting, storing and organizing vulnerability information.

    计算机弱点数据库成为弱点研究重要组成部分收集存储组织弱点信息具有重要意义

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定