• A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).

    创造力的攻击者透过摧毁堆叠利用缓冲区溢位弱点然后执行任何程序码。

    youdao

  • The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.

    MySQL默认安装特别是密码空缺缓冲区溢出潜在漏洞使得这个数据库服务器成为容易攻击目标

    youdao

  • The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow.

    造成漏洞直接原因Sendmail的一个安全检测有缺陷的,可以发生缓冲区溢出

    youdao

  • All of these attacksand many othersexploited a vulnerability called a buffer overflow.

    所有这些攻击——以及其他许多攻击,都利用了一个称做缓冲区溢出的程序缺陷。

    youdao

  • All of these attacksand many othersexploited a vulnerability called a buffer overflow.

    所有这些攻击——以及其他许多攻击,都利用了一个称做缓冲区溢出的程序缺陷。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定