When this security bulletin was issued, had these vulnerabilities been publicly disclosed?
此漏洞仅影响x64和Itanium架构。
This vulnerability only affects the x64 and Itanium architectures.
不幸的是,没有潜在的缓解方法意味着用户可能会受到此漏洞的攻击。
Unfortunately, there is no potential mitigation method thatmeans that users may be attacked by this flaw.
此漏洞也称为L1TerminalFault(L1TF)。
This vulnerability is also known as L1 Terminal Fault(L1TF).
微软的分析表明,攻击者可以构造持续利用此漏洞的利用代码。
Microsoft analysis has shown that exploit code could be created in such away that an attacker could consistently exploit this vulnerability.
此漏洞本身不允许运行任意代码。
These vulnerabilities by themselves do not allow arbitrary code to be run.
此外,他们可以使用此漏洞将消息发送到任何电话号码,而不仅仅是用于注册TikTok帐户的电话号码。
Furthermore, they could use this hole to send a message to any phone number, not just those that were used to register TikTok accounts.
此漏洞只能由usb触发,需要物理访问。
This vulnerability can only be triggered over USB and requires physical access.
无权限的本地用户可以访问SUID(或其他特权)二进制文件,可以使用此漏洞升级他们在系统上的权限。
An unprivileged local user with access to SUID(or otherwise privileged)binary could use this flaw to escalate their privileges on the system.
此漏洞仅影响已启用iSCSI目标角色的服务器。
This vulnerability only affects servers for which the iSCSI target role has been enabled.
Microsoft建议尚未安装2017年7月安全更新的客户安装这些安全更新,以完全防止此漏洞。
Microsoft recommends that customers who have not already done so install the July 2017security updates to be fully protected from this vulnerability.
此漏洞是特别严重的因为我们知道它被积极的利用。
This vulnerability is particularly serious because we know it is being actively exploited.”.
在发布此安全公告时,Microsoft未收到任何表明此漏洞已公开用于攻击客户的信息。
When this security bulletin was issued, Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers.
此漏洞影响协议本身,并不特定于Windows操作系统。
This vulnerability affects the protocol itself and is not specific to the Windows operating system.
The vulnerability could be exploited when the specially crafted RTF e-mail message is previewed or opened in Outlook while using Word as the e-mail viewer.
对于此漏洞,我们将更改管理员密码,而不使用默认配置。
For this vulnerability, we will change the administrator password and not use the default configuration.
此漏洞允许某人访问来自您的PC的所有加密通信,从电子邮件到银行帐户等。
This flaw allows someone to gain access to all encrypted communication that comes from your PC, from e-mails to bank accounts and more.
由于此漏洞的严重性,Oracle建议尽快应用此安全警报。
Due to the severity of this vulnerability, Oracle strongly recommends that customers apply the updates provided by the Security Alert as soon as possible.
受此漏洞影响的组件是TCP/IP堆栈(tcpip.sys和tcpip6.sys)。
The component affected by this vulnerability is the TCP/IP stack(tcpip. sys and tcpip6. sys).
研究表明,此漏洞,反过来,可能使这些肿瘤更易治疗,如pembrolizumab坡道的免疫反应。
Studies have suggested that this vulnerability, in turn, may make these tumors more susceptible to therapies like pembrolizumab that ramp up the immune response.
有关此漏洞和建议操作的更多信息,请参阅安全通报:ADV180016|.
For more information about this vulnerability and recommended actions, please refer to the Security Advisory: ADV180016|.
使用此漏洞,黑客可以轻松启动拒绝服务(DoS)和其他形式的攻击。
Using this vulnerability, hackers can easily launch Denial of Service(DoS) and other forms of attacks.
使用此漏洞,攻击者可以访问未经授权的内部对象,可以修改数据或破坏应用程序。
Using this vulnerability, an attacker can gain access to unauthorized internal objects, can modify data or compromise the application.
利用此漏洞需要在受影响的环境中启用和使用ExchangeWeb服务(EWS)和推送通知。
Exploitation of this vulnerability requires Exchange Web Services(EWS) and Push Notifications to be enabled and in use in an affected environment.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt