代码搜索:may 开发教程

找到约 10,000 项符合「may 开发教程」的源代码

代码结果 10,000
www.eeworm.com/read/474310/6819400

done jsq.done

Thu May 07 17:02:17 2009
www.eeworm.com/read/474310/6819426

done sxh.done

Mon May 04 10:08:15 2009
www.eeworm.com/read/473927/6822298

txt 1436.txt

Rule: -- Sid: 1436 -- Summary: This event is generated when network traffic indicating the use of a multimedia application is detected. -- Impact: This may be a violation of corporate policy since
www.eeworm.com/read/473927/6822540

txt 2576.txt

Rule: -- Sid: 2576 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in a Oracle database implementation. -- Impact: Serious. Execution of arbitrary code
www.eeworm.com/read/473927/6822552

txt 2013.txt

Rule: -- Sid: 2013 -- Summary: CVS is the Concurrent Versions System, commonly used to help manage software development. -- Impact: This may be an intelligence gathering activity or an attempt to
www.eeworm.com/read/473927/6822636

txt 1428.txt

Rule: -- Sid: 1428 -- Summary: This event is generated when network traffic indicating the use of a multimedia application is detected. -- Impact: This may be a violation of corporate policy since
www.eeworm.com/read/473927/6822685

txt 2623.txt

Rule: -- Sid: 2623 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in a Oracle database implementation. -- Impact: Serious. Execution of arbitrary code
www.eeworm.com/read/473927/6822744

txt 2637.txt

Rule: -- Sid: 2637 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in a Oracle database implementation. -- Impact: Serious. Execution of arbitrary code
www.eeworm.com/read/473927/6822760

txt 2329.txt

Rule: -- Sid: 2329 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in Microsoft Windows Data Access Components. -- Impact: Serious. Execution of arbitra
www.eeworm.com/read/473927/6822763

txt 3456.txt

Rule: -- Sid: 3456 -- Summary: This event is generated when the user "root" logs in to a MySQL database from an external source. -- Impact: Serious. An attacker may have gained superuser acc