Vulnerability detection method and device, computer equipment and readable storage medium

A vulnerability detection and vulnerability technology, applied in computer security devices, computing, instruments, etc., can solve problems such as low efficiency of vulnerability scanning methods

Pending Publication Date: 2021-09-10
PING AN HEALTH INSURANCE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the embodiment of the present application is to provide a vulnerability detection method, device, computer equ

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device, computer equipment and readable storage medium
  • Vulnerability detection method and device, computer equipment and readable storage medium
  • Vulnerability detection method and device, computer equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The advantages of the present application will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0038] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0039] The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singula...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of data analysis, and provides a vulnerability detection method which comprises the steps of acquiring a vulnerability scanning task submitted by a user through a front end, wherein the vulnerability scanning task comprises a to-be-scanned object and address information of the to-be-scanned object; obtaining configuration information of a preset vulnerability scanning tool, and generating a Shell script according to the configuration information and the vulnerability scanning task; obtaining the to-be-scanned object according to the address information, and calling the vulnerability scanning tool through the Shell script to scan the to-be-scanned object to obtain a vulnerability scanning result; and classifying the plurality of vulnerabilities contained in the vulnerability scanning result according to vulnerability categories to obtain a vulnerability category classification result. According to the embodiment, the vulnerability scanning efficiency can be improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of artificial intelligence, and in particular to a vulnerability detection method, device computer equipment, and a readable storage medium. Background technique [0002] With the development of information technology to the present, information tools and software products have been popularized in various enterprises, and the current software products on the market have more or less security vulnerabilities, and the level of hacker technology has also developed accordingly. Enterprise users of software products with security vulnerabilities pose a threat, so security vulnerabilities will bring large or small risks of loss and hidden dangers to enterprise users under different circumstances. [0003] In response to the above situation, there are some open source security testing tools on the market, such as Burpsuite, but the inventors found that when the existing security testing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 王彦葛
Owner PING AN HEALTH INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products