... 内存漏洞 Memory Leak 系统漏洞 system bug and hole ; System Loophole ; DCOM RPC 漏洞检查 Vulnerability Check ...
基于16个网页-相关网页
Secondly, you should also check how many actual vulnerabilities the web vulnerability scanner discovered.
其次,你应该检查web漏洞扫描器发现了多少实际存在的漏洞。
Many programs intended to be secure have had a vulnerability called a time of check - time of use (TOCTOU) race condition.
有很多确定为安全的程序都存在称为“time of check - time of use”(TOCTOU)的竞争条件缺陷。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
应用推荐