代码搜索:4015
找到约 121 项符合「4015」的源代码
代码结果 121
www.eeworm.com/read/374861/9381822
jpg 4015.jpg
www.eeworm.com/read/418779/10906043
txt 4015.txt
Rule:
--
Sid:
4015
--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability is the Microsoft Plug and Play subsystem on a host.
--
Impact:
Serious. Execution of
www.eeworm.com/read/240162/4585573
a cxa4015.a
-- CXA4015.A
--
-- Grant of Unlimited Rights
--
-- Under contracts F33600-87-D-0337, F33600-84-D-0280, MDA903-79-C-0687,
-- F08630-91-C-0015, and DCA100-97-D-0025,
www.eeworm.com/read/233448/4679165
a cxa4015.a
-- CXA4015.A
--
-- Grant of Unlimited Rights
--
-- Under contracts F33600-87-D-0337, F33600-84-D-0280, MDA903-79-C-0687,
-- F08630-91-C-0015, and DCA100-97-D-0025,
www.eeworm.com/read/162614/5523652
a cxa4015.a
-- CXA4015.A
--
-- Grant of Unlimited Rights
--
-- Under contracts F33600-87-D-0337, F33600-84-D-0280, MDA903-79-C-0687,
-- F08630-91-C-0015, and DCA100-97-D-0025,
www.eeworm.com/read/366702/2873665
a cxa4015.a
-- CXA4015.A
--
-- Grant of Unlimited Rights
--
-- Under contracts F33600-87-D-0337, F33600-84-D-0280, MDA903-79-C-0687,
-- F08630-91-C-0015, and DCA100-97-D-0025,
www.eeworm.com/read/207991/5000171
mal tst4015.mal
# testing repeatative reverse optimalisation
r:= bat.new(:int,:int);
bat.insert(r,5:int,1:int);
o:= 0:oid;
rr:= bat.reverse(r);
z:= algebra.markT(rr,o);
s:= bat.reverse(r);
t:= bat.reverse(s);
k:=23:i