A vulnerability data processing method and device
A technology of data processing and loopholes, applied in the direction of electrical digital data processing, computer security devices, instruments, etc., can solve the problems of resource consumption, large manpower consumption, and low management efficiency, so as to reduce labor costs, improve management efficiency, and save manpower resource effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0077] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0078] One of the core ideas of the embodiment of the present invention is to set up an interactive page and a visualization page on the vulnerability data processing platform, receive the item to be tested input by the user on the interaction page, extract the original state information of the item to be tested and display it on the visualization page; When the project to be tested starts the test, the current state information of the project to be tested is generated according to the obtained test progress identifier; wherein, the current state information includes the completed test state; for the project to be tested in the completed test state, the corresponding vulnerability information is determined, according to Vulnerabili...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


