• This isn't the first time Microsoft has asked people to voluntarily upgrade, but it is the first time that it's been in response to an exploit or vulnerability.

    不是微软第一建议用户自愿升级但是第一次作为对某个事件或者漏洞回应而建议用户升级。

    youdao

  • It is possible for some threats in one SOA and other threats in a different SOA to exploit the same vulnerability in the originating SOA.

    可能出现一个SOA中的多个威胁不同soa中的其他威胁利用原始soa中的相同漏洞情况。

    youdao

  • An exploit is a program that demonstrates or exploits the vulnerability.

    漏洞利用(exloit)一个揭示利用安全性漏洞程序

    youdao

  • This report provides a great deal of information regarding each vulnerability detected, including a reference to the OWASP page that deals with the specific exploit.

    报告提供有关检测每个漏洞大量信息包括处理特定exploitOWASP页面引用

    youdao

  • Using the Hacme Casino site again, let's look at the vulnerability that WebScarab found: an SQL injection exploit at the login.

    再次使用Hacme Casino站点我们来看一下WebScarab发现漏洞:在登录时出现一个SQL注入exploit

    youdao

  • Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.

    最后是三个漏洞个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞最后利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。

    youdao

  • Subsequently, the aim is to detect a malware that is using an exploit or vulnerability.

    随后目的检测恶意软件,使用的是漏洞弱点

    youdao

  • The essence of software vulnerability is to exploit and affect system security.

    软件脆弱性本质利用该脆弱性可以影响系统安全

    youdao

  • Apple also says that a master key would amount to a vulnerability that hackers could exploit.

    苹果表示密钥构成安全隐患,黑客可能会加以利用。

    youdao

  • Fixed a security issue where memory corruption may occur when verifying the digital signatures. Attackers could exploit this vulnerability to execute a controlled crash.

    固定验证数字签名内存损坏可能发生安全问题攻击者可以利用漏洞执行控制的崩溃。

    youdao

  • Mercury Payment Systems' John Berkeley confirms that "If a hacker discovers [a vulnerability] a month or two after the end of [XP support], they have more time to exploit that."

    水星支付系统公司伯克利也说:“如果黑客XP终止支持的一两个发现了一个弱点他们就会有更多时间开发利用这个漏洞。”

    youdao

  • The advices to exploit properly groundwater should be based on current groundwater resource vulnerability because of its changes with time.

    地下水资源脆弱性具有变性,制定地下水合理利用模式时应当结合现状实际地下水资源脆弱性。

    youdao

  • The Advanced Encryption Standard (AES) derivative on which WPA2 is based has not been cracked and no brute force is required to exploit the vulnerability, Ahmad says.

    确实如此,不过要认证了的内部用户才可以利用这个漏洞,还是不能免费蹭网。

    youdao

  • Attackers generally don't care whether a vulnerability is due to a flaw or a bug, although bugs tend tobe easier to exploit.

    攻击一般关心是否漏洞是因为他们看到缺点错关心是否攻击误,虽然错误倾向部隆易于开采。

    youdao

  • We have seen cases in the past where information on how to exploit a newly updated vulnerability was posted to the web only a few days, or even hours, after a security update is released.

    我们已经看到过去资料如何利用漏洞更新发布网上只有几天甚至小时后安全更新发布

    youdao

  • According to Botezatu, Jack, who died in 2013, never revealed the nature of this exploit, meaning that it could remain an unpatched vulnerability in XP-based machines.

    博泰扎图表示,杰克于2013年)生前从来没有透露这项攻击手法性质意味着这个漏洞可能仍然存在基于XP的ATM机

    youdao

  • To reliably exploit this vulnerability, an attacker has to fill the 0x2000 bytes buffer until 3 bytes are left before the last header is copied into the 0x2000 bytes buffer.

    有效利用这种危险,一个攻击者必须满足缓冲区字节0x2000直到3字节正在最后复制0x2000字节缓冲区。

    youdao

  • To reliably exploit this vulnerability, an attacker has to fill the 0x2000 bytes buffer until 3 bytes are left before the last header is copied into the 0x2000 bytes buffer.

    有效利用这种危险,一个攻击者必须满足缓冲区字节0x2000直到3字节正在最后复制0x2000字节缓冲区。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定