代码搜索:execute
找到约 10,000 项符合「execute」的源代码
代码结果 10,000
www.eeworm.com/read/418779/10914028
txt 665.txt
Rule:
--
Sid:
665
--
Summary:
This event is generated when a remote user attempts to exploit a Sendmail vulnerability where a remote user can execute arbitrary code on an server running older versio
www.eeworm.com/read/418779/10920541
txt 1885.txt
Rule:
--
Sid:
1885
--
Summary:
This rule has been placed in deleted.rules
--
Impact:
attacker might have gained an ability to execute commands
remotely on the system.
--
Detailed Informati
www.eeworm.com/read/418779/10924094
txt 3813.txt
Rule:
--
Sid:
3813
--
Summary:
This event is generated when an attempt is made to remotely execute a command using the awstats.pl configdir parameter vulnerability.
--
Impact:
Serious. Execution of
www.eeworm.com/read/417019/11007103
js 16.07 - undo with command logging.js
/* Movement commands. */
var MoveUp = function(cursor) { // implements Command
this.cursor = cursor;
};
MoveUp.prototype = {
execute: function() {
cursor.move(0, -10);
}
};
/* Cursor class
www.eeworm.com/read/129161/7077799
def zlib.def
LIBRARY "zlib"
DESCRIPTION '"""zlib data compression library"""'
EXETYPE NT
SUBSYSTEM WINDOWS
STUB 'WINSTUB.EXE'
VERSION 1.04
CODE EXECUTE READ
DATA READ WRITE
HEAPSIZE
www.eeworm.com/read/125142/7126663
def zlib.def
LIBRARY "zlib"
DESCRIPTION '"""zlib data compression library"""'
EXETYPE NT
SUBSYSTEM WINDOWS
STUB 'WINSTUB.EXE'
VERSION 1.14
CODE EXECUTE READ
DATA READ WRITE
HEAPSIZE
www.eeworm.com/read/464279/7166950
sh ex-08-03_arithsub.sh
#!/bin/ksh
# Chapter 08 - Section Arithmetic Subsitution
# This script demonstrates the arithmetic substitution
# facilitiy in ksh/bash. To execute the script under
# bash, change the first line.
foo