代码搜索:execute

找到约 10,000 项符合「execute」的源代码

代码结果 10,000
www.eeworm.com/read/473927/6823625

txt 1356.txt

Rule: -- Sid: 1350 -- Summary: Attempted perl access via web -- Impact: Attempt to execute a perl script on a host. -- Detailed Information: This is an attempt to execute a perl script on a host.
www.eeworm.com/read/473927/6824709

txt 301.txt

Rule: -- Sid: 301 -- Summary: This event is generated when an attempt is made to escalate privileges remotely using a vulnerability in LPRng. -- Impact: System compromize presenting the attacker wi
www.eeworm.com/read/473927/6825570

txt 3193.txt

Rule: -- Sid: 3193 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in Microsoft Internet Information Server. -- Impact: Serious. Code execution leading
www.eeworm.com/read/473927/6825720

txt 1635.txt

Rule: -- Sid: 1635 -- Summary: This event is generated when an attempt is made to exploit a potential buffer overflow using the APOP command. If running a vulnerable mail server, such as older X
www.eeworm.com/read/473927/6825736

txt 3194.txt

Rule: -- Sid: 3194 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in Microsoft Internet Information Server. -- Impact: Serious. Code execution leading
www.eeworm.com/read/473097/6856307

java rellogops.java

class RelLogOps { public static void main(String args[]) { int x, y; boolean a, b; x = 10; y = 11; if(x < y) System.out.println("x < y"); if(x
www.eeworm.com/read/395562/8168164

asp admin.asp

www.eeworm.com/read/195082/8174641

asp c_huifu.asp

www.eeworm.com/read/194976/8180550

asp isauthor.asp

www.eeworm.com/read/193618/8211226

asp savevote.asp