• Secondly, you should also check how many actual vulnerabilities the web vulnerability scanner discovered.

    其次应该检查web漏洞扫描器发现了多少实际存在的漏洞

    youdao

  • Many programs intended to be secure have had a vulnerability called a time of check - time of use (TOCTOU) race condition.

    有很多确定为安全的程序都存在称为timeofcheck- time ofuse”(TOCTOU)的竞争条件缺陷。

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • Yesterday a vulnerability was discovered: a specially crafted URL could be requested that would allow an attacker to bypass a security check to verify a user requested a password reset.

    大意昨天检查发现了一个特别url提交漏洞可能导致用户密码被非法更改。

    youdao

  • Yesterday a vulnerability was discovered: a specially crafted URL could be requested that would allow an attacker to bypass a security check to verify a user requested a password reset.

    大意昨天检查发现了一个特别url提交漏洞可能导致用户密码被非法更改。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定