System vulnerability scanning method, device, computer equipment and storage medium
A vulnerability scanning and vulnerability technology, applied in the field of security detection to ensure the safe operation of the system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] see figure 1 , the present embodiment proposes a method for detecting system vulnerabilities, which specifically includes the following steps:
[0046] S1: In response to the system vulnerability issuing instruction, obtain the newly added vulnerability associated with the system under test in the system vulnerability issuing instruction, and generate a temporary scanning rule according to the description information of the newly added vulnerability; wherein the temporary scanning rule is used for Scan for the newly added vulnerabilities.
[0047]As computer applications become wider and more powerful, security vulnerabilities in information technology products have become a major factor in system and network threats. To put it figuratively, a security hole in a computer system is equivalent to a time bomb, hiding danger at any time. Therefore, the importance of security vulnerabilities is self-evident, and the timely release of security vulnerabilities and correspond...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


