搜索结果
找到约 6 项符合
vulnerability 的查询结果
Linux/Unix编程 The same vulnerability to x_hp-ux11i_nls_ct.c,but exploit ping command to get root shell.
The same vulnerability to x_hp-ux11i_nls_ct.c,but exploit ping command to get root shell.
Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco
I. Introduction
This code exploits a previously undisclosed vulnerability in the bit string
decoding code in the Microsoft ASN.1 library. This vulnerability is not related
to the bit string vulnerability described in eEye advisory AD20040210-2. Both
vulnerabilities were fixed in the MS04-007 patch. ...
软件工程 America鈥檚 energy vulnerability
America鈥檚 energy vulnerability
微处理器开发 Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.
Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any
of the resource kits. It has proved to be an extremely versatile tool on
the unix platform. So why should NT always be unix s poor cousin when it
comes to tcp/ip testing and exploration? I bet many NT admins out there
ke ...
其他 W32.Blaster.Worm is a worm that propagates by exploiting the Microsoft Windows DCOM RPC Interface Bu
W32.Blaster.Worm is a worm that propagates by exploiting the Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (BID 8205).
http://www.symantec.com/security_response/writeup.jsp?docid=2003-081113-0229-99&tabid=2
书籍 Smart+Grid
The term “ smart grid ” defi nes a self - healing network equipped with dynamic optimiza-
tion techniques that use real - time measurements to minimize network losses, maintain
voltage levels, increase reliability, and improve asset management. The operational data
collected by the smart grid and ...