Unlock instant, AI-driven research and patent intelligence for your innovation.

js script file vulnerability detection method and system

A script file, vulnerability detection technology, applied in the field of vulnerability detection, can solve problems such as heavy workload and low efficiency, and achieve the effect of ensuring efficiency and effectiveness

Active Publication Date: 2020-09-01
SECZONE TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, reviewing vulnerabilities manually is a heavy workload and inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • js script file vulnerability detection method and system
  • js script file vulnerability detection method and system
  • js script file vulnerability detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to describe the technical content, structural features, achieved goals and effects of the present invention in detail, the following will be described in detail in conjunction with the embodiments and accompanying drawings.

[0062] see figure 1 , figure 1 It is a flow chart of the steps of the JS script file vulnerability detection method in the first embodiment of the present invention. A JS script file vulnerability detection method, comprising the steps of:

[0063] Step S100, using the jsrepository.json file to create a first vulnerability repository.

[0064] Step S200, scanning and parsing the JS script file to obtain vulnerability matching information.

[0065] Step S300, according to the vulnerability matching information, perform vulnerability matching in the first vulnerability database to generate a second vulnerability database.

[0066] Using the JS script file vulnerability detection method provided by the present invention, the functions that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a JS script file vulnerability detection method and system. The method includes the following steps: using the jsrepository.json file to establish a first vulnerability library; scanning and parsing the JS script file to obtain vulnerability matching information; according to the vulnerability matching information, in the Perform vulnerability matching in the first vulnerability library to generate a second vulnerability library; obtain JS script file version information; obtain CVE information to collect CPE information; match the JS script file version information with the CPE information to generate matching data; Adding the matching data to the second vulnerability database to generate a fourth vulnerability database. As a result, the vulnerability information of the JS script file can be obtained directly and more accurately, ensuring the efficiency and effect of vulnerability auditing.

Description

technical field [0001] The invention relates to a loophole detection technology, in particular to a JS script file loophole detection method and system. Background technique [0002] Open source components are widely used by developers today, and it is estimated that 80%-90% of every application consists of open source components. Studies have shown that half of the third-party components used in software applications are outdated and potentially insecure. And more than 60 percent of all applications using open source components contain known software vulnerabilities. Then analyzing the CVE of each open source component will provide effective information support for the project composition analysis (SCA). At present, there are no relevant mature technologies and products in the market. Therefore, in order to solve this problem, it is generally used to manually find each vulnerability, and then go to the official website of the relevant product to find relevant information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 汪杰万振华王颉董燕李华
Owner SECZONE TECH CO LTD