Vulnerability detection method, device, storage medium and electronic equipment

A technology for vulnerability detection and detection results, applied in the computer field, can solve problems such as low vulnerability detection efficiency, and achieve the effect of improving vulnerability detection efficiency and solving low vulnerability detection efficiency.

Active Publication Date: 2021-05-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a vulnerability detection method, device, storage medium, and electronic equipment to at least solve the technical problem of low vulnerability detection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method, device, storage medium and electronic equipment
  • Vulnerability detection method, device, storage medium and electronic equipment
  • Vulnerability detection method, device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0025] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability detection method, device, storage medium and electronic equipment in a cloud technology scene, and specifically, it also relates to technologies such as protection in the field of cloud security. Wherein, the method includes: calling the built-in probe function of the self-defined function in the target system to detect the first data, so as to obtain the first detection result; when the first detection result indicates that the first data is normal, use the self-defined function to process The first data to obtain the second data; when the second data is returned to the custom function, call the probe function to detect the second data to obtain the second detection result, wherein the second detection result is used to indicate the target system Whether there is a vulnerability. The invention solves the technical problem of low loophole detection efficiency.

Description

technical field [0001] The invention relates to the field of computers, in particular to a vulnerability detection method, device, storage medium and electronic equipment. Background technique [0002] With the popularity of the Internet, the Internet (Internet) has penetrated into all aspects of people's lives, and web applications are a common channel for people to access the Internet. Hypertext Preprocessor (PHP) as a global wide area network (World Wide Web, Web) application is one of the most commonly used programming forces. Due to its flexible and dynamic characteristics and insufficient consideration of programmers’ security awareness and code logic, there are more and more loopholes in PHP applications. How to effectively resist and timely The discovery of vulnerabilities has become a pain point for many enterprises today. Protection methods based on request characteristics can no longer meet the security protection needs of enterprises. As early as 2012, Gartner p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577G06F2221/033G06F2221/034H04L63/1433H04L63/30
Inventor 张航
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products