代码搜索:parameter
找到约 10,000 项符合「parameter」的源代码
代码结果 10,000
www.eeworm.com/read/418779/10908315
txt 3463.txt
Rule:
--
Sid:
3463
--
Summary:
This event is generated when an attempt is made to access the cgi script
awstats.pl.
--
Impact:
Possible execution of system commands.
--
Detailed Information:
Adava
www.eeworm.com/read/418779/10910803
txt 3816.txt
Rule:
--
Sid:
3816
--
Summary:
This event is generated when an attempt is made to exploit a vulnerability
associated with BadBlue web server.
--
Impact:
Serious. Execution of arbitrary commands may
www.eeworm.com/read/418779/10913329
txt 3629.txt
Rule:
--
Sid:
3629
--
Summary:
This event is generated when an attempt is made to access a vulnerable script associated with the Sambar web server.
--
Impact:
Serious. Execution of arbitrary comman
www.eeworm.com/read/418779/10916325
txt 4985.txt
Rule:
--
Sid:
4985
--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in an implementation of the Twiki web application.
--
Impact:
Serious. Possible
www.eeworm.com/read/418779/10916532
txt 3150.txt
Rule:
--
Sid:
3150
--
Summary:
This event is generated when an attempt is made to exploit a
vulnerability in Microsoft Windows SQL Server.
--
Impact:
Serious. Code execution is possible leading to
www.eeworm.com/read/418779/10923200
txt 4987.txt
Rule:
--
Sid:
4987
--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in an implementation of the Twiki web application.
--
Impact:
Serious. Possible
www.eeworm.com/read/418779/10924094
txt 3813.txt
Rule:
--
Sid:
3813
--
Summary:
This event is generated when an attempt is made to remotely execute a command using the awstats.pl configdir parameter vulnerability.
--
Impact:
Serious. Execution of
www.eeworm.com/read/418695/10935562
m set.m
%SET Set mapping parameters
%
% W = set(W,name,value)
%
% Sets the parameter of the given name (as string) of the mapping W to value.
% No error checking is done. If this is desired, use the mapping c