百香果配什么好喝| 补钙什么时间段最好| 幼对什么| 牙龈流血是什么原因| 失眠吃什么水果| 梅核气是什么病| 梦到自己结婚什么意思| gjb2基因杂合突变是什么意思| 3月3是什么星座| 小众是什么意思| 蓝莓和什么不能一起吃| 心衰竭是什么症状| 六畜大宝在农家是什么生肖| ua是什么意思| 肝胆湿热吃什么中成药| 什么叫肿瘤| 嘴巴里发苦是什么原因| 四次元是什么意思| 为什么会偏头痛| 环形红斑是什么病| 右眼睛跳是什么原因| 地动山摇是什么生肖| 梦见病人好了什么预兆| 正常人为什么传导阻滞| 梦见黑蛇是什么意思| 政治面貌是什么意思| 什么瓜不能吃脑筋急转弯| 仙境是什么意思| 黄芪什么时候种植| 大便黑色什么原因| 胃肠感冒吃什么食物比较好| 交泰殿是干什么的| 转氨酶高说明什么| 晚上难以入睡是什么原因| 堃是什么意思| 嘴唇发乌是什么原因| 安属于五行属什么| 水晶和玻璃有什么区别| 尿急憋不住尿是什么原因| ella是什么意思| 埃及法老是什么意思| vans什么意思| 情商是什么| 羊经后半边读什么| 牙痛用什么止痛| 荞麦长什么样子图片| 为什么拔牙后不能吐口水| 鸭胗是什么器官| 朋友是什么意思| 世界上最大的东西是什么| 十月一日是什么节| 三个毛念什么字| 5月22号是什么星座| vodka是什么酒| 喝什么提神| 狗为什么不吃饭| 滑脉是什么意思| 累得什么| 巴马汤泡脚有什么功效| 飞蚊症用什么滴眼液| landrover是什么车| 山什么水什么| 邪魅一笑是什么意思| 产物是什么意思| 肺炎不能吃什么| 嬴稷是秦始皇的什么人| 马天尼是什么酒| 二月花是什么花| 颈椎头晕吃点什么药| 9月3号是什么日子| hia是什么意思| 阴中求阳是什么意思| 利是什么生肖| 什么是无为| g18k是什么金| 便民门诊是做什么的| 血糖有点高吃什么食物好| 光绪帝叫什么名字| 血压低是什么原因| 三心二意是什么意思| 红润润的什么| 1870年是什么朝代| 痰湿中阻吃什么中成药| 非你莫属是什么意思| 合欢是什么意思| 什么食用油最好最健康| 维生素c对身体有什么好处| 什么是应届毕业生| 胎盘什么时候形成| 金针菇为什么叫明天见| 冯巩什么军衔| 雍正为什么只在位13年| shy是什么意思| 左边肚子疼是什么原因| 山楂有什么功效| 情未了什么意思| 射精什么意思| 睾丸癌是由什么引起的| 一直想大便是什么原因| 右边肋骨疼是什么原因| 什么叫脂溢性皮炎| 许莫氏结节是什么意思| 什么是多囊| 雪茄是什么| 莲蓬什么季节成熟| 老花眼是什么原因引起的| ckd5期是什么意思| 手为什么会长水泡| 妇科假丝酵母菌是什么病| 斑马鱼吃什么| 什么是筋膜| 腹部b超能检查什么| 蛤蟆吃什么| 鹅喜欢吃什么食物| gold是什么牌子| 333是什么意思| 亲家是什么意思| 治疗幽门螺旋杆菌的四联药是什么| 吃中药喝酒有什么影响| 痔疮初期症状是什么| 红曲米是什么| 毛主席什么时候去世| 柬埔寨用什么货币| 坐骨神经痛用什么药| 睡着了放屁是什么原因| 毛肚是什么| 尿隐血是什么原因| 备孕喝苏打水什么作用| 小便尿不出来什么原因| 梦见自己得了重病预示什么| 诸葛亮是个什么样的人| 妈妈咪呀是什么意思| 苏州立秋吃什么| 麾下什么意思| 维生素h是什么| 出虚汗是什么原因引起的怎么调理| 一月七号是什么星座| 小便发红是什么症状男| 湿热吃什么食物| 为什么屁多| 知恩图报是什么意思| 绝经三年了突然又出血了什么原因| 黄疸是什么引起的| 均质是什么意思| 宫颈炎是什么| 腹股沟淋巴结肿大是什么原因| 促销是什么意思| 公招是什么意思| 飞机杯什么意思| 腹部痛是什么原因| 7月7日是什么纪念日| 禄存是什么意思| 过敏什么东西不能吃| ABB式的词语有什么| 什么水果榨汁好喝| 风情万种的意思是什么| 上传下达是什么意思| 脸上为什么会长斑| 肛门痛是什么原因| 男孩取什么名字好| 花名册是什么意思| 甘油三酯低是什么原因| 眉毛里面长痘痘是什么原因| 八卦是什么| 为什么生理期不能做| 14年属什么生肖| mcm中文叫什么牌子| 1月22日什么星座| 如常所愿是什么意思| 谢娜人气为什么那么高| 世界上什么东西最大| 寿元是什么意思| 盗汗和自汗有什么区别| 苦瓜泡水喝有什么功效| 双子女和什么座最配对| 通奸是什么意思| 豪爽是什么意思| 家是什么生肖| 七月三号是什么日子| poppy是什么意思| 甲状腺结节吃什么药| 修为是什么意思| 甲鱼喜欢吃什么食物| 三个十念什么| 风骚什么意思| 为什么总是想吐| 脑梗前有什么征兆| 打喷嚏漏尿是什么原因| 做爱什么姿势最舒服| 清明上河图描绘的是什么季节的景象| 为什么叫五十肩| 人言可畏什么意思| 吃不胖是什么原因| 大腿根内侧发黑是什么原因| 牛不吃草是什么原因| 颈动脉斑块吃什么药好| 釜底抽薪是什么意思| 什么魂什么魄| 折寿是什么意思| suan是什么意思| 陪衬是什么意思| 放炮是什么意思| 跨境电商是做什么的| 囊肿挂什么科| 血压低有什么办法| 国医堂是什么意思| 怀孕1个月有什么症状| 血压高的表现症状是什么| 车前草能治什么病| Continental什么牌子| 胃不消化吃什么药效果最好| 意阑珊什么意思| 鼻炎吃什么药最好| 风流是什么意思| 喝酒手麻是什么原因| 脚气是什么样的图片| 脚气泡脚用什么泡最好| 什么食物降尿酸效果好| 女人什么时候最容易怀孕| 付诸东流是什么意思| 什么人不适合去高原| 巨蟹女喜欢什么样的男生| 淘宝预售是什么意思| 包粽子用什么米| 感冒发烧挂什么科| 月经褐色量少是什么原因| 数字3五行属什么| 触霉头是什么意思| 私处为什么会发黑| 他说风雨中这点痛算什么| 不吃香菜什么意思| 病理报告是什么| 气血亏虚什么症状| v3是什么意思| 女生吃木瓜有什么好处| 脱肛吃什么药| 肠道易激惹综合症是什么症状| ntl是什么意思| 为什么贫血| cr值是什么| 支气管炎是什么| 窈窕淑女是什么生肖| 秋天都有什么| 梦见自己嫁人了预示着什么| 皮肤暗黄是什么原因| 骨骼惊奇什么意思| 调休是什么意思| 情商高是什么意思| 车顶放饮料是什么意思| 高铁二等座是什么意思| 中性粒细胞高说明什么| 牙龈肿是什么原因引起的| 挂科什么意思| 粘液丝高是什么原因| 五十而知天命是什么意思| 尿蛋白高不能吃什么食物| 甲状腺球蛋白抗体低说明什么| 耳朵旁边长痘痘是什么原因| 什么人不用电| 血肌酐高是什么原因| 为什么一紧张就拉肚子| 我的部首是什么| 出去玩带什么| 神经系统是由什么组成的| 百度Jump to content

诛仙手游8.10公测 元宝装备八大福利等你来领

From Wikipedia, the free encyclopedia
(Redirected from Software vulnerability)
百度 随着生活品质的提高,原来越多的消费者对于车也有了更高的要求,更多的期待。

Vulnerabilities are flaws or weaknesses in a system's design, implementation, or management that can be exploited by a malicious actor to compromise its security.

Despite a system administrator's best efforts to achieve complete correctness, virtually all hardware and software contain bugs where the system does not behave as expected. If the bug could enable an attacker to compromise the confidentiality, integrity, or availability of system resources, it can be considered a vulnerability. Insecure software development practices as well as design factors such as complexity can increase the burden of vulnerabilities.

Vulnerability management is a process that includes identifying systems and prioritizing which are most important, scanning for vulnerabilities, and taking action to secure the system. Vulnerability management typically is a combination of remediation, mitigation, and acceptance.

Vulnerabilities can be scored for severity according to the Common Vulnerability Scoring System (CVSS) and added to vulnerability databases such as the Common Vulnerabilities and Exposures (CVE) database. As of November 2024, there are more than 240,000 vulnerabilities catalogued in the CVE database.[1]

A vulnerability is initiated when it is introduced into hardware or software. It becomes active and exploitable when the software or hardware containing the vulnerability is running. The vulnerability may be discovered by the administrator, vendor, or a third party. Publicly disclosing the vulnerability (through a patch or otherwise) is associated with an increased risk of compromise, as attackers can use this knowledge to target existing systems before patches are implemented. Vulnerabilities will eventually end when the system is either patched or removed from use.

Causes

[edit]

Despite a system administrator's best efforts, virtually all hardware and software contain bugs.[2] If a bug creates a security risk, it is called a vulnerability.[3][4][5] Software patches are often released to fix identified vulnerabilities, but zero-days are still liable for exploitation.[6] Vulnerabilities vary in their ability to be exploited by malicious actors, and the actual risk is dependent on the nature of the vulnerability as well as the value of the surrounding system.[7] Although some vulnerabilities can only be used for denial of service attacks, more dangerous ones allow the attacker to perform code injection without the user's awareness.[3] Only a minority of vulnerabilities allow for privilege escalation, which is typically necessary for more severe attacks.[8] Without a vulnerability, an exploit typically cannot gain access.[9] It is also possible for malware to be installed directly, without an exploit, through social engineering or poor physical security such as an unlocked door or exposed port.[10]

Design factors

[edit]

Vulnerabilities can be worsened by poor design factors, such as:

  • Complexity: Large, complex systems increase the possibility of flaws and unintended access points.[11]
  • Familiarity: Using common, well-known code, software, operating systems, and/or hardware increases the probability an attacker has or can find the knowledge and tools to exploit the flaw.[12] However, using well-known software, particularly free and open-source software, comes with the benefit of having more frequent and reliable software patches for any discovered vulnerabilities.[citation needed]
  • Connectivity: any system connected to the internet can be accessed and compromised. Disconnecting systems from the internet can be extremely effective at preventing attacks, but it is not always feasible.[13]
  • Legacy software and hardware is at increased risk by nature.[14] System administrators should consider upgrading from legacy systems, but this is often prohibitive in terms of cost and downtime.[citation needed]

Development factors

[edit]

Some software development practices can affect the risk of vulnerabilities being introduced to a code base. Lack of knowledge about secure software development or excessive pressure to deliver features quickly can lead to avoidable vulnerabilities to enter production code, especially if security is not prioritized by the company culture. This can lead to unintended vulnerabilities. The more complex the system is, the easier it is for vulnerabilities to go undetected. Some vulnerabilities are deliberately planted, which could be for any reason from a disgruntled employee selling access to cyber criminals, to sophisticated state-sponsored schemes to introduce vulnerabilities to software.

Poor software development practices can affect the likelihood of introducing vulnerabilities to a code base. Lack of knowledge or training regarding secure software development, excessive pressure to deliver, or an excessively complex code base can all allow vulnerabilities to be introduced and left unnoticed. These factors can also be exacerbated if security is not prioritized by the company culture. [15] Inadequate code reviews can also lead to missed bugs, but there are also static code analysis tools that can be used during the code review process to help find some vulnerabilities.[16]

DevOps, a development workflow that emphasizes automated testing and deployment to speed up the deployment of new features, often requires that many developers be granted access to change configurations, which can lead to deliberate or inadvertent inclusion of vulnerabilities.[17] Compartmentalizing dependencies, which is often part of DevOps workflows, can reduce the attack surface by paring down dependencies to only what is necessary.[18] If software as a service is used, rather than the organization's own hardware and software, the organization is dependent on the cloud services provider to prevent vulnerabilities.[19]

National Vulnerability Database classification

[edit]

The National Vulnerability Database classifies vulnerabilities into eight root causes that may be overlapping, including:[20]

  1. Input validation vulnerabilities exist when input checking is not sufficient to prevent the attacker from injecting malicious code. Buffer overflow exploits, buffer underflow exploits, and boundary condition exploits typically take advantage of this category.[21]
  2. Access control vulnerabilities enable an attacker to access a system that is supposed to be restricted to them, or engage in privilege escalation.[21]
  3. When the system fails to handle and exceptional or unanticipated condition correctly, an attacker can exploit the situation to gain access.[22]
  4. Configuration vulnerability come into existence when configuration settings cause risks to the system security, leading to such faults as unpatched software or file system permissions that do not sufficiently restrict access.[22]
  5. A race condition—when timing or other external factors change the outcome and lead to inconsistent or unpredictable results—can cause a vulnerability.[22]

Vulnerabilities by component

[edit]

Hardware

[edit]

Deliberate security bugs can be introduced during or after manufacturing and cause the integrated circuit not to behave as expected under certain specific circumstances. Testing for security bugs in hardware is quite difficult due to limited time and the complexity of twenty-first century chips,[23] while the globalization of design and manufacturing has increased the opportunity for these bugs to be introduced by malicious actors.[24]

Operating system

[edit]

Although operating system vulnerabilities vary depending on the operating system in use, a common problem is privilege escalation bugs that enable the attacker to gain more access than they should be allowed. Open-source operating systems such as Linux and Android have a freely accessible source code and allow anyone to contribute, which could enable the introduction of vulnerabilities. However, the same vulnerabilities also occur in proprietary operating systems such as Microsoft Windows and Apple operating systems.[25] All reputable vendors of operating systems provide patches regularly.[26]

Client–server applications

[edit]

Client–server applications are downloaded onto the end user's computers and are typically updated less frequently than web applications. Unlike web applications, they interact directly with a user's operating system. Common vulnerabilities in these applications include:[27]

Web applications

[edit]

Web applications run on many websites. Because they are inherently less secure than other applications, they are a leading source of data breaches and other security incidents.[28][29] They can include:

Attacks used against vulnerabilities in web applications include:

Management

[edit]

There is little evidence about the effectiveness and cost-effectiveness of different cyberattack prevention measures.[32] Although estimating the risk of an attack is not straightforward, the mean time to breach and expected cost can be considered to determine the priority for remediating or mitigating an identified vulnerability and whether it is cost effective to do so.[33] Although attention to security can reduce the risk of attack, achieving perfect security for a complex system is impossible, and many security measures have unacceptable cost or usability downsides.[34] For example, reducing the complexity and functionality of the system is effective at reducing the attack surface.[35]

Successful vulnerability management usually involves a combination of remediation (closing a vulnerability), mitigation (increasing the difficulty, and reducing the consequences, of exploits), and accepting some residual risk. Often a defense in depth strategy is used for multiple barriers to attack.[36] Some organizations scan for only the highest-risk vulnerabilities as this enables prioritization in the context of lacking the resources to fix every vulnerability.[37] Increasing expenses is likely to have diminishing returns.[33]

Remediation

[edit]

Remediation fixes vulnerabilities, for example by downloading a software patch.[38] Vulnerability scanners are typically unable to detect zero-day vulnerabilities, but are more effective at finding known vulnerabilities based on a database. These systems can find some known vulnerabilities and advise fixes, such as a patch.[39][40] However, they have limitations including false positives.[38]

Vulnerabilities can only be exploited when they are active-the software in which they are embedded is actively running on the system.[41] Before the code containing the vulnerability is configured to run on the system, it is considered a carrier.[42] Dormant vulnerabilities can run, but are not currently running. Software containing dormant and carrier vulnerabilities can sometimes be uninstalled or disabled, removing the risk.[43] Active vulnerabilities, if distinguished from the other types, can be prioritized for patching.[41]

Vulnerability mitigation is measures that do not close the vulnerability, but make it more difficult to exploit or reduce the consequences of an attack.[44] Reducing the attack surface, particularly for parts of the system with root (administrator) access, and closing off opportunities for exploits to engage in privilege exploitation is a common strategy for reducing the harm that a cyberattack can cause.[38] If a patch for third-party software is unavailable, it may be possible to temporarily disable the software.[45]

Testing

[edit]

A penetration test attempts to enter the system via an exploit to see if the system is insecure.[46] If a penetration test fails, it does not necessarily mean that the system is secure.[47] Some penetration tests can be conducted with automated software that tests against existing exploits for known vulnerabilities.[48] Other penetration tests are conducted by trained hackers. Many companies prefer to contract out this work as it simulates an outsider attack.[47]

Vulnerability lifecycle

[edit]
Vulnerability timeline

The vulnerability lifecycle begins when vulnerabilities are introduced into hardware or software.[49] Detection of vulnerabilities can be by the software vendor, or by a third party. In the latter case, it is considered most ethical to immediately disclose the vulnerability to the vendor so it can be fixed.[50] Government or intelligence agencies buy vulnerabilities that have not been publicly disclosed and may use them in an attack, stockpile them, or notify the vendor.[51] As of 2013, the Five Eyes (United States, United Kingdom, Canada, Australia, and New Zealand) captured the plurality of the market and other significant purchasers included Russia, India, Brazil, Malaysia, Singapore, North Korea, and Iran.[52] Organized criminal groups also buy vulnerabilities, although they typically prefer exploit kits.[53]

Even vulnerabilities that are publicly known or patched are often exploitable for an extended period.[54][55] Security patches can take months to develop,[56] or may never be developed.[55] A patch can have negative effects on the functionality of software[55] and users may need to test the patch to confirm functionality and compatibility.[57] Larger organizations may fail to identify and patch all dependencies, while smaller enterprises and personal users may not install patches.[55] Research suggests that risk of cyberattack increases if the vulnerability is made publicly known or a patch is released.[58] Cybercriminals can reverse engineer the patch to find the underlying vulnerability and develop exploits,[59] often faster than users install the patch.[58]

Vulnerabilities become deprecated when the software or vulnerable versions fall out of use.[50] This can take an extended period of time; in particular, industrial software may not be feasible to replace even if the manufacturer stops supporting it.[60]

Assessment, disclosure, and inventory

[edit]

Assessment

[edit]

A commonly used scale for assessing the severity of vulnerabilities is the open-source specification Common Vulnerability Scoring System (CVSS). CVSS evaluates the possibility to exploit the vulnerability and compromise data confidentiality, availability, and integrity. It also considers how the vulnerability could be used and how complex an exploit would need to be. The amount of access needed for exploitation and whether it could take place without user interaction are also factored in to the overall score.[61][62]

Disclosure

[edit]

Someone who discovers a vulnerability may disclose it immediately (full disclosure) or wait until a patch has been developed (responsible disclosure, or coordinated disclosure). The former approach is praised for its transparency, but the drawback is that the risk of attack is likely to be increased after disclosure with no patch available.[63] Some vendors pay bug bounties to those who report vulnerabilities to them.[64][65] Not all companies respond positively to disclosures, as they can cause legal liability and operational overhead.[66] There is no law requiring disclosure of vulnerabilities.[67] If a vulnerability is discovered by a third party that does not disclose to the vendor or the public, it is called a zero-day vulnerability, often considered the most dangerous type because fewer defenses exist.[68]

Vulnerability inventory

[edit]

The most commonly used vulnerability dataset is Common Vulnerabilities and Exposures (CVE), maintained by Mitre Corporation.[69] As of November 2024, it has over 240,000 entries[1] This information is shared into other databases, including the United States' National Vulnerability Database,[69] where each vulnerability is given a risk score using Common Vulnerability Scoring System (CVSS), Common Platform Enumeration (CPE) scheme, and Common Weakness Enumeration.[citation needed] CVE and other databases typically do not track vulnerabilities in software as a service products.[39] Submitting a CVE is voluntary for companies that discovered a vulnerability.[67]

Liability

[edit]

The software vendor is usually not legally liable for the cost if a vulnerability is used in an attack, which creates an incentive to make cheaper but less secure software.[70] Some companies are covered by laws, such as PCI, HIPAA, and Sarbanes-Oxley, that place legal requirements on vulnerability management.[71]

References

[edit]
  1. ^ a b "CVE - Program Metrics". 15 November 2024.
  2. ^ Ablon & Bogart 2017, p. 1.
  3. ^ a b Ablon & Bogart 2017, p. 2.
  4. ^ Daswani & Elbayadi 2021, p. 25.
  5. ^ Seaman 2020, pp. 47–48.
  6. ^ Daswani & Elbayadi 2021, pp. 26–27.
  7. ^ Haber & Hibbert 2018, pp. 5–6.
  8. ^ Haber & Hibbert 2018, p. 6.
  9. ^ Haber & Hibbert 2018, p. 10.
  10. ^ Haber & Hibbert 2018, pp. 13–14.
  11. ^ Kakareka, Almantas (2009). "23". In Vacca, John (ed.). Computer and Information Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 393. ISBN 978-0-12-374354-1.
  12. ^ Krsul, Ivan (April 15, 1997). Technical Report CSD-TR-97-026. The COAST Laboratory Department of Computer Sciences, Purdue University. CiteSeerX 10.1.1.26.5435.
  13. ^ Linkov & Kott 2019, p. 2.
  14. ^ Haber & Hibbert 2018, p. 155.
  15. ^ Strout 2023, p. 17.
  16. ^ Haber & Hibbert 2018, p. 143.
  17. ^ Haber & Hibbert 2018, p. 141.
  18. ^ Haber & Hibbert 2018, p. 142.
  19. ^ Haber & Hibbert 2018, pp. 135–137.
  20. ^ Garg & Baliyan 2023, pp. 17–18.
  21. ^ a b Garg & Baliyan 2023, p. 17.
  22. ^ a b c Garg & Baliyan 2023, p. 18.
  23. ^ Salmani 2018, p. 1.
  24. ^ Salmani 2018, p. 11.
  25. ^ Garg & Baliyan 2023, pp. 20–25.
  26. ^ Sharp 2024, p. 271.
  27. ^ a b c Strout 2023, p. 15.
  28. ^ a b c d Strout 2023, p. 13.
  29. ^ Haber & Hibbert 2018, p. 129.
  30. ^ a b c d e Strout 2023, p. 14.
  31. ^ Strout 2023, pp. 14–15.
  32. ^ Agrafiotis et al. 2018, p. 2.
  33. ^ a b Haber & Hibbert 2018, pp. 97–98.
  34. ^ Tjoa et al. 2024, p. 63.
  35. ^ Tjoa et al. 2024, pp. 68, 70.
  36. ^ Magnusson 2020, p. 34.
  37. ^ Haber & Hibbert 2018, pp. 166–167.
  38. ^ a b c Haber & Hibbert 2018, p. 11.
  39. ^ a b Strout 2023, p. 8.
  40. ^ Haber & Hibbert 2018, pp. 12–13.
  41. ^ a b Haber & Hibbert 2018, p. 84.
  42. ^ Haber & Hibbert 2018, p. 85.
  43. ^ Haber & Hibbert 2018, pp. 84–85.
  44. ^ Magnusson 2020, p. 32.
  45. ^ Magnusson 2020, p. 33.
  46. ^ Haber & Hibbert 2018, p. 93.
  47. ^ a b Haber & Hibbert 2018, p. 96.
  48. ^ Haber & Hibbert 2018, p. 94.
  49. ^ Strout 2023, p. 16.
  50. ^ a b Strout 2023, p. 18.
  51. ^ Libicki, Ablon & Webb 2015, p. 44.
  52. ^ Perlroth 2021, p. 145.
  53. ^ Libicki, Ablon & Webb 2015, pp. 44, 46.
  54. ^ Ablon & Bogart 2017, p. 8.
  55. ^ a b c d Sood & Enbody 2014, p. 42.
  56. ^ Strout 2023, p. 26.
  57. ^ Libicki, Ablon & Webb 2015, p. 50.
  58. ^ a b Libicki, Ablon & Webb 2015, pp. 49–50.
  59. ^ Strout 2023, p. 28.
  60. ^ Strout 2023, p. 19.
  61. ^ Strout 2023, pp. 5–6.
  62. ^ Haber & Hibbert 2018, pp. 73–74.
  63. ^ "Ask an Ethicist: Vulnerability Disclosure". Association for Computing Machinery's Committee on Professional Ethics. 17 July 2018. Retrieved 3 May 2024.
  64. ^ O'Harrow 2013, p. 18.
  65. ^ Libicki, Ablon & Webb 2015, p. 45.
  66. ^ Strout 2023, p. 36.
  67. ^ a b Haber & Hibbert 2018, p. 110.
  68. ^ Strout 2023, p. 22.
  69. ^ a b Strout 2023, p. 6.
  70. ^ Sloan & Warner 2019, pp. 104–105.
  71. ^ Haber & Hibbert 2018, p. 111.

Sources

[edit]
[edit]
ysl是什么品牌 颈动脉斑块吃什么药效果最好 sma是什么 经期洗澡有什么影响 晕车是什么原因引起的
扁桃体割了对身体有什么影响 平头哥是什么意思 什么叫占位病变 上午10点半是什么时辰 字字珠玑是什么意思
脸油是什么原因导致的 碱和小苏打有什么区别 挂红是什么意思 脸过敏吃什么药 十八罗汉分别叫什么
毛手毛脚什么意思 醋泡黑豆有什么功效 人为什么要拉屎 b2c什么意思 腹泻吃什么食物好得快
蜜饯是什么东西hcv9jop6ns5r.cn 检查有没有怀孕挂什么科hcv8jop7ns6r.cn 维他命是什么意思hcv7jop4ns5r.cn 身上有红色的小红点是什么原因hcv9jop2ns1r.cn 下午一点到三点是什么时辰hcv9jop2ns0r.cn
一个月一个太念什么hcv7jop7ns1r.cn 看鼻子挂什么科hcv8jop6ns4r.cn 幽门螺杆菌吃什么药hcv9jop0ns2r.cn 一进大门看见什么最好hcv8jop9ns4r.cn 做肠镜要做什么准备hcv9jop4ns7r.cn
铁蛋白高是什么意思bysq.com 什么馅的包子好吃hcv8jop1ns8r.cn 耋是什么意思hcv8jop2ns5r.cn 中性粒细胞百分比偏低是什么意思hcv9jop2ns4r.cn 手到擒来是什么意思hanqikai.com
果子狸携带什么病毒sscsqa.com 腿上紫色血丝什么原因hcv7jop6ns5r.cn 静脉血是什么颜色jasonfriends.com 淋巴结为什么会肿大cl108k.com 航空器是什么hcv8jop9ns4r.cn
百度