代码搜索:execute

找到约 10,000 项符合「execute」的源代码

代码结果 10,000
www.eeworm.com/read/418779/10914028

txt 665.txt

Rule: -- Sid: 665 -- Summary: This event is generated when a remote user attempts to exploit a Sendmail vulnerability where a remote user can execute arbitrary code on an server running older versio
www.eeworm.com/read/418779/10920541

txt 1885.txt

Rule: -- Sid: 1885 -- Summary: This rule has been placed in deleted.rules -- Impact: attacker might have gained an ability to execute commands remotely on the system. -- Detailed Informati
www.eeworm.com/read/418779/10924094

txt 3813.txt

Rule: -- Sid: 3813 -- Summary: This event is generated when an attempt is made to remotely execute a command using the awstats.pl configdir parameter vulnerability. -- Impact: Serious. Execution of
www.eeworm.com/read/417019/11007103

js 16.07 - undo with command logging.js

/* Movement commands. */ var MoveUp = function(cursor) { // implements Command this.cursor = cursor; }; MoveUp.prototype = { execute: function() { cursor.move(0, -10); } }; /* Cursor class
www.eeworm.com/read/129161/7077799

def zlib.def

LIBRARY "zlib" DESCRIPTION '"""zlib data compression library"""' EXETYPE NT SUBSYSTEM WINDOWS STUB 'WINSTUB.EXE' VERSION 1.04 CODE EXECUTE READ DATA READ WRITE HEAPSIZE
www.eeworm.com/read/125142/7126663

def zlib.def

LIBRARY "zlib" DESCRIPTION '"""zlib data compression library"""' EXETYPE NT SUBSYSTEM WINDOWS STUB 'WINSTUB.EXE' VERSION 1.14 CODE EXECUTE READ DATA READ WRITE HEAPSIZE
www.eeworm.com/read/464279/7166950

sh ex-08-03_arithsub.sh

#!/bin/ksh # Chapter 08 - Section Arithmetic Subsitution # This script demonstrates the arithmetic substitution # facilitiy in ksh/bash. To execute the script under # bash, change the first line. foo
www.eeworm.com/read/462831/7194546

php3 odbc_cursor.php3

odbc_cursor
www.eeworm.com/read/462831/7194556

php3 odbc_fetch_into.php3

odbc_fetch_into
www.eeworm.com/read/462831/7194572

php3 odbc_close.php3

odbc_close