Vulnerability detection method and device
A vulnerability detection and vulnerability technology, applied in the computer field, can solve the problems of high false positive rate and false negative of vulnerabilities, and achieve the effect of reducing the false positive rate of vulnerabilities and improving the accuracy of vulnerability detection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0021] figure 1 is a schematic flow chart of the first embodiment of the vulnerability detection method of the present invention; figure 1 As shown, the vulnerability detection method of the present invention comprises the following steps:
[0022] Step S01, receiving the source code that needs to be tested for vulnerabilities;
[0023] The vulnerability detection program receives the source code that needs to be tested for the vulnerability; The source code submitted regularly by SVN (subversion, version management) tool. In an actual application scenario, the source code submitted by the web page is usually the source code developed by PHP (Professional Hypertex...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


