AppDetectivePro has long set the standard for database vulnerability scanning, assessment and compliance capabilities.
AppDetectivePro早已确立了数据库的脆弱性扫描、评估和履约能力的标准。
Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.
这个数据库中的每个条目包含对安全漏洞的简要说明和相关的参考资料。
This is much different from a traditional "vulnerability database" that documents known bugs in off-the-shelf software.
很大程度区别于传统的“弱点数据库”。
The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.
MySQL的默认安装,特别是根密码空缺和缓冲区溢出的潜在漏洞,使得这个数据库服务器成为容易攻击的目标。
Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.
最后是三个漏洞:一个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞的,最后是利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。
It can be said that as long as people are still writing database applications, SQL injection vulnerability will always exist.
可以说,只要人类还在编写数据库应用,SQL注入漏洞就会一直存在。
In this article, I'll discuss the two that have provided the most value to my organization: the National Vulnerability Database and the National Cyber Alert System.
在这篇文章里,我将讨论已提供的对我的组织最有价值的两个:国家漏洞数据库和国家网络报警系统。
The research on computer vulnerabilities and the building of the vulnerability database are significant in improving system's security and reducing computer security incidents.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性、减少安全事件发生具有重要意义。
The research on computer vulnerabilities and the building of the vulnerability database are significant for improving system's security and reducing computer security incidents.
计算机系统安全漏洞的研究以及漏洞库的建设,对于提高系统安全性,减少安全事件发生具有重要意义。
The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.
安全漏洞分类和漏洞库设计是计算机安全漏洞研究的基础。
The software includes three subsystems: database system, aircraft target vulnerability model system and graphics visualization module.
该软件包括数据库系统、易损性评估系统和可视化模块三大子系统。
This 1.6 version fixes a critical security vulnerability. 3, this version is not compatible with previous versions of the database.
此1.6版本修补了一个致命安全漏洞。3、这个版本不兼容以前版本的数据库。
Computer vulnerability database has been an important part of vulnerability research, and it is greatly significant for collecting, storing and organizing vulnerability information.
计算机弱点数据库已成为弱点研究的重要组成部分,对收集、存储和组织弱点信息具有重要意义。
Computer vulnerability database has been an important part of vulnerability research, and it is greatly significant for collecting, storing and organizing vulnerability information.
计算机弱点数据库已成为弱点研究的重要组成部分,对收集、存储和组织弱点信息具有重要意义。
应用推荐