• Therefore, as a hack, an attacker might authenticate as a valid user, but then provide an HTTP header (perhaps the iv-cred) that implies more permissions than he actually has.

    因此攻击者可能作为有效用户通过认证然后提供一个HTTP 消息(可能为 iv-cred ),这个消息头表明实际上更多权限

    youdao

  • Therefore, as a hack, an attacker might authenticate as a valid user, but then provide an HTTP header (perhaps the iv-cred) that implies more permissions than he actually has.

    因此攻击者可能作为有效用户通过认证然后提供一个HTTP 消息(可能为 iv-cred ),这个消息头表明实际上更多权限

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定