This creates a security vulnerability.
这会产生安全漏洞。
But improperly managed virtualization is also a potential security vulnerability.
但是不正确的虚拟化管理也是一个潜在的安全漏洞。
Sometimes, even just reading data can be a security vulnerability — before the data is even checked!
有时,即使只是读入数据也可以是安全漏洞——甚至在数据被检查之前!
Last week, CNVD compiled and released the following important security vulnerability information.
上周,CNVD整理和发布以下重要安全漏洞信息。
Application roles depend on the security of a password, which presents a potential security vulnerability.
应用程序角色依赖于密码的安全性,而密码具有潜在的安全漏洞。
A perfect security vulnerability collection model based on the notion of vulnerability auto-collection is proposed.
提出了一种完善的安全漏洞收集模型。
Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.
这个数据库中的每个条目包含对安全漏洞的简要说明和相关的参考资料。
Despite claims to the contrary, TRACE is not a security vulnerability and there is no viable reason for it to be disabled.
虽然有很多声明与此相反,TRACE并不是一个安全漏洞,并且也没有可行的理由来禁用它。
This 1.6 version fixes a critical security vulnerability. 3, this version is not compatible with previous versions of the database.
此1.6版本修补了一个致命安全漏洞。3、这个版本不兼容以前版本的数据库。
If a caller can influence the generated code in a way that causes a compiler error, a security vulnerability might also exist there.
如果调用方能够影响生成的代码并因而导致编译器错误,则这也是安全弱点。
After analyzing various shortcomings of evaluation methods, the paper proposes a multi-dimensional security vulnerability evaluation model.
在分析其评估方法的不足之处后,提出了一种多维度的安全漏洞风险评估方法。
This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).
本文概述了目前的安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。
First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.
首先介绍了此方法的基本原理,然后介绍了该方法在安全漏洞评估中的具体实现。
In the past, if a security vulnerability was discovered for Windows, you had to patch all your machines, which were physically separated from one another.
在过去,如果一个安全缺陷被发现在窗户,你不得不补丁你所有的机械,这些机械是身体由彼此分离。
The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.
安全漏洞分类和漏洞库设计是计算机安全漏洞研究的基础。
Memcpy joins the ranks of other popular functions like strcpy, strncpy, strcat, strncat which were banned due to their security vulnerability through buffer overruns.
memcpy加入到strcpy,strncpy,strcat,strncat等常用函数的队伍中,都是由于可通过缓存溢出进行安全攻击而被禁用。
With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.
随着等级保护的应用和普及,网络安全漏洞扫描需充分考虑执行效率和功能的扩展性问题。
Let's take a look at three containers, each of which is associated with a response type that you could use in describing application security vulnerability in a Web service.
让我们检查一下三种容器,其中任意一种都与您在Web服务中用于描述应用程序安全漏洞的响应类型相关。
In this case the recipe would add all the necessary code in the right places, greatly reducing the chance of a mistake leading to a runtime failure or security vulnerability.
在这种情况下,recipe会在正确的位置添加所有必要的代码,这会显著减少导致运行失败或安全脆弱性的错误机会。
It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.
它通过构造一个有明显安全漏洞的系统来引诱入侵者对其进行攻击,捕获入侵者攻击过程中在蜜罐系统上的活动数据。
In case we announce a security vulnerability patch release, you should upgrade your installation as fast as possible to ensure that it is protected from all known vulnerabilities.
如果我们发布了安全性漏洞补丁的话,你应当尽快进行升级以保证其不受攻击。
Comparison of security patches is able to detect the changes between different versions of executables, analyzing changes can get the specific information of security vulnerability.
安全补丁比较技术能有效揭示同一程序补丁前后的差异,通过差异分析得到所补漏洞的详细信息。
All that is required is the target person's cellphone number, a computer and some knowledge of how cellular networks work, said the report, which aimed to spotlight a security vulnerability.
报告称,所需的只是跟踪目标的手机号码,一台计算机和一些关于手机网络运行的知识。报告旨在曝光安全漏洞。
Based on the analysis of a perfect security vulnerability collection module, this article presents that exploiting a new software-security vulnerability auto-collection software is necessary.
本文在对一种完善的安全漏洞收集模型分析的基础上,指出了开发一种新的软件——安全漏洞自动收集软件的必要性。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
To avoid vulnerability to security breaches, an application server that USES these trusted methods should not use un-trusted connection methods.
为了避免对安全漏洞的攻击,使用这些受信任方法的应用服务器不应该使用不受信任的连接方法。
What if a hacker discovers a vulnerability in the security mechanism that allows him to break through the authentication without the need to know the required user's authentication information?
如果黑客在安全机制中发现了一个漏洞,让他可以破解身份验证,而不需要了解用户的身份验证信息,那么会怎么样?
In the security field, several tools are designed to do what's known as vulnerability testing, each offering different features and benefits.
在安全领域,有一些工具被用于执行所谓的漏洞测试,每个工具提供不同的特性,各具优势。
The security advisory, which was published on Friday, details how the vulnerability can be used to manipulate users and take over their machines.
据该安全报告,于星期五发布,详细的指出了该漏洞会怎样被用来操控用户和控制他们的机器。
The solution also provides vulnerability assessment and configuration-auditing capabilities that enable DBAs to directly evaluate the security of their databases.
解决方案还提供漏洞评估和配置审计功能,让 DBA 可以直接评估数据库的安全性。
应用推荐