• 本文主要介绍代码注入攻击一种特殊类型XPath

    The focus of this article is a specific type of code injection attack: the Blind XPath injection.

    youdao

  • 这些预防方法多数可以类似应用预防其他类型代码注入攻击

    Not surprisingly most of these preventative methods are the same methods you can and should use to prevent other typical code injection attacks.

    youdao

  • SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载了解

    Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    youdao

  • 一种常见Web应用程序攻击威胁某种形式代码注入Wikipedia将其定义为。

    One of the more common attacks or threats to Web applications is some form of code injection, which Wikipedia defines as.

    youdao

  • 恶劣注入攻击形式也许代码注入——代码置入正在运行进程内存空间随后指示正在运行的进程执行这些代码

    Perhaps the most malicious form of injection attack is code injection—placing new code into the memory space of the running process and then directing the running process to execute it.

    youdao

  • 我们已经知道攻击是如何代码注入应用程序接下来再看看一些常见攻击所带来的影响

    Now that you know how attackers get their code into applications, look at the implications of some common attacks.

    youdao

  • 如果用户能够SQL代码直接传递应用程序代码一个查询执行那么可能发生SQL注入攻击

    A SQL injection vulnerability occurs when a user is able to pass SQL code directly to the application in such a way that the code will be executed in a query.

    youdao

  • 例如攻击可能通过堆栈溢出(stackcorruption)代码注入进程从而执行攻击选定代码

    For example, attackers could be trying to inject code into the process via stack corruption, resulting in the ability to execute code of the attacker's choice.

    youdao

  • AjaxChat还具有安全性能够防止代码注入SQL注入跨站点脚本攻击会话偷窃以及其他攻击

    Ajax Chat has security in mind to prevent code injections, SQL injections, cross-site scripting, session stealing, and other attacks.

    youdao

  • mashup中的某些部分出于恶意目的编写的(或者攻击),可以将恶意代码注入应用程序中。

    When some part of the mashup is written under malicious intent (or has been hacked), it can inject malicious code into the application.

    youdao

  • 如果未经验证而输入直接传递服务器应用程序无意中执行注入代码攻击可能损坏破坏数据

    If the input is passed directly to the server without being validated and if the application inadvertently executes the injected code, then the attack has the potential to damage or destroy data.

    youdao

  • 比特梵德检测阻止试图改变计算机重要系统文件注册表的行为,并代码注入(DLL注入)攻击进行警告。

    BitDefender detects and blocks attempts to change critical system files or registry entries and warns about attacks performed by code injection (DLL injection).

    youdao

  • 介绍SQL注入攻击原理,SQL注入攻击过程功能代码本身方面详细介绍了SQL注入攻击防范措施

    In this article, the author explains the principle and process of SQL Injection Attack, and introduces a serial interrelated solution to prevent SQL Injection Attack from the aspect of code in detail.

    youdao

  • 介绍SQL注入攻击原理,SQL注入攻击过程功能代码本身方面详细介绍了SQL注入攻击防范措施

    In this article, the author explains the principle and process of SQL Injection Attack, and introduces a serial interrelated solution to prevent SQL Injection Attack from the aspect of code in detail.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定