• System has taken some security measures to maintain system security, of preventing SQL injection vulnerability functions.

    系统采取了一些安全措施维护系统安全,实现防止SQL注入漏洞等功能。

    youdao

  • It can be said that as long as people are still writing database applications, SQL injection vulnerability will always exist.

    可以说只要人类在编写数据库应用SQL注入漏洞就会一直存在

    youdao

  • A SQL injection vulnerability occurs when a user is able to pass SQL code directly to the application in such a way that the code will be executed in a query.

    如果用户能够SQL代码直接传递应用程序代码将一个查询执行那么可能发生SQL注入攻击

    youdao

  • SQL injection attacks are a vulnerability that tend to hurt high-value sites.

    SQL注入攻击一个可能损害高价值站点的漏洞

    youdao

  • SQL injection is the second most popular vulnerability, primarily because of the growing dependence Web sites have on databases.

    SQL注入第二流行漏洞这主要是因为Web站点数据库的依赖性日益增加

    youdao

  • Using the Hacme Casino site again, let's look at the vulnerability that WebScarab found: an SQL injection exploit at the login.

    再次使用Hacme Casino站点我们来看一下WebScarab发现漏洞:在登录时出现一个SQL注入exploit。

    youdao

  • Max shows in this use case that Flume tackles problems well beyond known vulnerability types (buffer overrun, cross-site scripting and SQL injection).

    Max以此说明Flume能解决的问题不止已知缺陷类型(缓冲区溢出跨站脚本以及SQL注入)。

    youdao

  • Max shows in this use case that Flume tackles problems well beyond known vulnerability types (buffer overrun, cross-site scripting and SQL injection).

    Max以此说明Flume能解决的问题不止已知缺陷类型(缓冲区溢出跨站脚本以及SQL注入)。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定