代码搜索:execute
找到约 10,000 项符合「execute」的源代码
代码结果 10,000
www.eeworm.com/read/418779/10921147
txt 3193.txt
Rule:
--
Sid:
3193
--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in Microsoft Internet Information Server.
--
Impact:
Serious. Code execution leading
www.eeworm.com/read/418779/10922380
txt 1635.txt
Rule:
--
Sid:
1635
--
Summary:
This event is generated when an attempt is made to exploit a potential buffer overflow using the APOP command. If running a vulnerable mail server, such as older XM
www.eeworm.com/read/418779/10922572
txt 3194.txt
Rule:
--
Sid:
3194
--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in Microsoft Internet Information Server.
--
Impact:
Serious. Code execution leading
www.eeworm.com/read/272684/10948681
bas modulemain.bas
Attribute VB_Name = "ModuleMain"
Global con As New ADODB.Connection
Global Rst As New ADODB.Recordset
Global gExit As Boolean
Global gLogin As Boolean
Global LoginName As String
Global Login
www.eeworm.com/read/465829/7046754
frm main.frm
VERSION 5.00
Object = "{DAAC6951-59A4-4C08-9D6E-FE3919B64861}#1.0#0"; "FlexCell.ocx"
Object = "{D959C709-8613-11D1-9840-002078110E7D}#1.0#0"; "as97Popup.ocx"
Object = "{74848F95-A02A-4286-AF0C-A3C7
www.eeworm.com/read/465829/7046759
frm form5.frm
VERSION 5.00
Object = "{DAAC6951-59A4-4C08-9D6E-FE3919B64861}#1.0#0"; "FlexCell.ocx"
Begin VB.Form Form5
BorderStyle = 0 'None
Caption = "课程管理"
ClientHeight = 5025