This isn't the first time Microsoft has asked people to voluntarily upgrade, but it is the first time that it's been in response to an exploit or vulnerability.
这不是微软第一次建议用户自愿升级,但是这是第一次作为对某个事件或者漏洞的回应而建议用户升级。
It is possible for some threats in one SOA and other threats in a different SOA to exploit the same vulnerability in the originating SOA.
可能出现一个SOA中的多个威胁和不同soa中的其他威胁利用原始soa中的相同漏洞的情况。
An exploit is a program that demonstrates or exploits the vulnerability.
漏洞利用(exloit)是一个揭示或利用安全性漏洞的程序。
This report provides a great deal of information regarding each vulnerability detected, including a reference to the OWASP page that deals with the specific exploit.
该报告提供有关检测到的每个漏洞的大量信息,包括对处理特定exploit的OWASP页面的引用。
Using the Hacme Casino site again, let's look at the vulnerability that WebScarab found: an SQL injection exploit at the login.
再次使用Hacme Casino站点,我们来看一下WebScarab发现的漏洞:在登录时出现一个SQL注入exploit。
Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.
最后是三个漏洞:一个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞的,最后是利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。
Subsequently, the aim is to detect a malware that is using an exploit or vulnerability.
随后,目的是检测恶意软件,使用的是漏洞或弱点。
The essence of software vulnerability is to exploit and affect system security.
软件脆弱性的本质是利用该脆弱性可以影响系统的安全。
Apple also says that a master key would amount to a vulnerability that hackers could exploit.
苹果还表示,主密钥会构成安全隐患,黑客可能会加以利用。
Fixed a security issue where memory corruption may occur when verifying the digital signatures. Attackers could exploit this vulnerability to execute a controlled crash.
固定验证数字签名时内存损坏可能发生的安全问题。攻击者可以利用此漏洞执行受控制的崩溃。
Mercury Payment Systems' John Berkeley confirms that "If a hacker discovers [a vulnerability] a month or two after the end of [XP support], they have more time to exploit that."
水星支付系统公司的伯克利也说:“如果一个黑客在XP终止支持的一两个月后发现了一个弱点,他们就会有更多的时间开发利用这个漏洞。”
The advices to exploit properly groundwater should be based on current groundwater resource vulnerability because of its changes with time.
地下水资源脆弱性具有时变性,制定地下水合理利用模式时应当结合现状实际地下水资源脆弱性。
The Advanced Encryption Standard (AES) derivative on which WPA2 is based has not been cracked and no brute force is required to exploit the vulnerability, Ahmad says.
确实如此,不过要认证了的内部用户才可以利用这个漏洞,还是不能免费蹭网。
Attackers generally don't care whether a vulnerability is due to a flaw or a bug, although bugs tend tobe easier to exploit.
攻击者一般不关心是否有漏洞,是因为他们看到缺点或错关心是否攻击误,虽然错误倾向部隆吉易于开采。
We have seen cases in the past where information on how to exploit a newly updated vulnerability was posted to the web only a few days, or even hours, after a security update is released.
我们已经看到在过去的资料,如何利用新漏洞更新发布到网上只有几天,甚至小时后,安全更新发布。
According to Botezatu, Jack, who died in 2013, never revealed the nature of this exploit, meaning that it could remain an unpatched vulnerability in XP-based machines.
博泰扎图表示,杰克(死于2013年)生前从来没有透露这项攻击手法的性质,这也就意味着这个漏洞可能仍然存在基于XP的ATM机里。
To reliably exploit this vulnerability, an attacker has to fill the 0x2000 bytes buffer until 3 bytes are left before the last header is copied into the 0x2000 bytes buffer.
有效地利用这种危险,一个攻击者必须满足的缓冲区字节0x2000直到3字节正在左前最后头是复制到0x2000字节缓冲区。
To reliably exploit this vulnerability, an attacker has to fill the 0x2000 bytes buffer until 3 bytes are left before the last header is copied into the 0x2000 bytes buffer.
有效地利用这种危险,一个攻击者必须满足的缓冲区字节0x2000直到3字节正在左前最后头是复制到0x2000字节缓冲区。
应用推荐