英語 での To exploit the vulnerability の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
That doesn't mean that it's impossible to exploit the vulnerability.
To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it.
Microsoft is aware of limited, targeted attacks attempting to exploit the vulnerability.
To exploit the vulnerability, an attacker must first convince the userto open a malicious document or application.
Then, specially craftedweb content could be used to exploit the vulnerability on affected systems.
To exploit the vulnerability, an attacker could host a specially-crafted website that is designed to invoke MSXML through Internet Explorer.
We believe that the attacker used information from Bugzilla to exploit the vulnerability we patched on August 6.
To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser.
To exploit the vulnerability an attacker would first have to perform a man-in-the-middle(MiTM) attack between the client and a legitimate server.
Christopher Budd, senior security response manager at Microsoft, wrote on the company's security blog:"We're able to confirm that, in the past few days,we have seen an increase in attempts to exploit the vulnerability".
To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser.
However, if Word is the selected email reader, which is the default case in Microsoft Outlook 2007, Outlook 2010, and Outlook 2013, then an attacker couldleverage Outlook for the email attack vector to exploit the vulnerability by sending a specially crafted RTF email message to the target user.
To exploit the vulnerability, an attacker could host a specially-crafted website that is designed to invoke MSXML through Internet Explorer.
To exploit the vulnerability, an attacker could host a specially-crafted website that is designed to invoke MSXML through Internet Explorer.
To exploit the vulnerability, an attacker could create specially crafted XML data and induce an application to parse and validate the XML data.
To exploit the vulnerability, an attacker would first need access to the target system and have the ability to copy a file to a shared folder or drive.
To exploit the vulnerability, an attacker would first have to inject unencrypted data into the secure channel and then perform a man-in-the-middle attack between the targeted client and a legitimate server.
While within China the press is increasingly tightly controlled,abroad Beijing has sought to exploit the vulnerabilities of the free press to its advantage.
Insider Threat Any individual with insider access to an organization's networks orresources that would allow them to exploit the vulnerabilities of that organization's security or steal data.
To exploit this vulnerability, the attacker needs valid administrator credentials.
However, in order to exploit this vulnerability the attacker must have a valid logon credential and be able to logon locally.