Memory space breach — Accomplished via stack overflow, buffer overrun, or heap error, enables execution of arbitrary code supplied by the attacker with the permissions of the host process.
内存空间缺口——通过栈溢出、缓冲区溢出或堆错误来实现,以宿主进程的权限执行攻击者提供的任何代码。
Those objects can be allocated directly on the stack (which is faster) and do not enter the heap or require inspection or removal by the normal garbage collector (which reduces GC).
这样,我们就可以直接在栈上为这些对象开辟内存空间(这么做更快),无需使用堆,也不必使用常规的GC手段进行对象检测与移除了(这么做会降低GC的次数,进而提升效率)。
C + + offers programmers a choice of allocating objects on the heap or on the stack.
C+ +向程序员提供了在堆或堆栈中分配对象的选择。
The location that is written to can be the heap or even worse, a location where code is stored (so instructions are overwritten) or the stack so your code calls into the middle of nowhere.
错误写入处可能是堆,但更糟糕的是,可能写入的是存放代码指令处,因此先前指令会被重写,这样代码执行到中间就无法继续调用了。
You can construct the object on the heap or on the stack frame of a function.
可以在堆或函数的堆栈帧上构造对象。
To correct this warning, you can either move some data to heap, or increase the stack size.
若要更正这则警告,您可以将部分资料移至堆积,或增加堆叠大小。
To correct this warning, you can either move some data to heap, or increase the stack size.
若要更正这则警告,您可以将部分资料移至堆积,或增加堆叠大小。
应用推荐