TO EXPLOIT THE VULNERABILITY 中文是什么意思 - 中文翻译

[tə 'eksploit ðə ˌvʌlnərə'biliti]
[tə 'eksploit ðə ˌvʌlnərə'biliti]
利用此漏洞
利用该漏洞

在 英语 中使用 To exploit the vulnerability 的示例及其翻译为 中文

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
It turns out the actor didn't even have to exploit the vulnerability of this service.
事实证明,黑客甚至不用利用这项服务的脆弱性
To exploit the vulnerability, an attacker could send a specially crafted DHCP response to the client.".
利用此漏洞,攻击者可以向客户端发送特制的DHCP响应。
The attacker just needs to know the victim's PNR(Passenger Name Record)number to exploit the vulnerability.
攻击者只需知道受害者的PNR(乘客姓名记录)号码即可利用该漏洞
To exploit the vulnerability an unauthenticated attacker could send a specially crafted authentication request.
若要利用此漏洞,未进行身份验证的攻击者可以发送经特殊设计的身份验证请求。
We believe that the attacker used information from Bugzilla to exploit the vulnerability we patched on August 6th.
我们认为,攻击者将会使用Bugzilla系统中的信息来利用那个我们在8月6日所修复的漏洞
To exploit the vulnerability, a user must open/import a specially crafted Microsoft JET Database Engine file.
利用此漏洞,用户必须打开/导入特制的MicrosoftJET数据库引擎文件。
Since then, Apple has simply suspended the entire Group FaceTime feature,preventing those who continue to exploit the vulnerability.
其后,Apple索性把整个GroupFaceTime功能暂停,阻止有心人再继续利用这漏洞
To exploit the vulnerability, hackers would send specially crafted messages to the Windows Search service.
为了利用此漏洞,黑客将向WindowsSearch服务发送特制消息。
She says the easiest route for cyber criminals is to exploit the vulnerability of humans“through simple yet sophisticated social engineering tactics”.
她说对于网络犯罪分子来说,最简单的方法就是“通过简单而复杂的社会工程策略”从而利用人类的脆弱性
To exploit the vulnerability, an attacker must first convince the userto open a malicious document or application.
若要利用此漏洞,攻击者首先必须诱使用户打开恶意文档或应用程序。
To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it.
利用此漏洞,攻击者可以手工创建一个特殊的文档文件,然后说服用户打开它。
To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website that contains malicious PDF content.
若要利用此漏洞,在基于Web的攻击情形中,攻击者可能会托管一个包含恶意PDF内容的网站。
To exploit the vulnerability, an attacker must use a certificate issued from the domain for IP-HTTPS server authentication.
利用此漏洞,恶意攻击者必须使用从针对IP-HTTPS服务器身份验证的域颁发的证书。
To exploit the vulnerability, an attacker would first have to access the local computer, and then run a malicious program.
若要利用此漏洞,攻击者首先必须访问本地计算机,然后运行恶意程序。
To exploit the vulnerability, the attacker could send specially crafted SMB messages to the Windows Search service.
利用此漏洞,攻击者可以向WindowsSearch服务发送特制的SMB消息。
To attempt to exploit the vulnerability, an attacker must be able to log on locally to the system and run a program.
要尝试利用此漏洞,攻击者必须能够本地登录到系统并运行程序。
To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser.
利用此漏洞,攻击者可以托管一个旨在通过Web浏览器调用MSXML的特制网站。
To exploit the vulnerability, an attacker must gain physical accessto the target system prior to the next system reboot.
利用此漏洞,攻击者必须在下次系统重新启动之前获得对目标系统的物理访问权限。
To exploit the vulnerability, an attacker would first need to convincethe user to open a malicious document or application.
利用此漏洞,攻击者首先需要说服用户打开恶意文档或应用程序。
To exploit the vulnerability, an attacker could host a specially-crafted website that is designed to invoke MSXML through Internet Explorer.
利用此漏洞,攻击者可以托管一个旨在通过Web浏览器调用MSXML的特制网站。
To exploit the vulnerability, an attacker would first have to log on to a target system and then run a specially crafted application.
想要成功该漏洞,攻击者首先必须登录到目标系统,然后运行特制的应用程序。
To exploit the vulnerability, an attacker must convince the user to openthe specially crafted file in Microsoft Paint.
要利用漏洞,攻击者必须诱使用户在MicrosoftPaint中打开特制的文件。
To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server.
若要利用该漏洞,攻击者必须说服用户启动到特制SMB服务器的SMB连接。
To exploit the vulnerability, in most situations, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv1 server.
为了利用此漏洞,在多数情况下,未经身份验证的攻击者可能向目标SMBv1服务器发送经特殊设计的数据包。
But researchers from Austria's Graz Technical Universitytold Reuters they have figured out a way to exploit the Meltdown vulnerability to attack Galaxy S7 handsets.
但是,奥地利格拉茨技术大学的安全研究人员称,他们已发现了利用Meltdown漏洞攻击GalaxyS7手机的方法。
But researchers from Austria's Graz Technical Universitytold Reuters they have figured out a way to exploit the Meltdown vulnerability to attack Galaxy S7 handsets.
但是,来自奥地利格拉茨技术大学的研究人员于近日告诉路透社,他们已经找到了一种利用Meltdown漏来攻击GalaxyS7的方法。
Without such cooperation,organized criminal elements would continue to exploit the vulnerabilities of migrants.
没有这种合作,有组织犯罪分子将继续利用移民
For millennia, the best salespeople have known how to exploit the vulnerabilities of the human mind.
几千年来,最好的销售人员已经知道如何利用人类心灵脆弱的一面。
Russia has started systematic attempts to explore and exploit the vulnerability of the West.
他表示:"俄罗斯开始系统地尝试研究和利用西方的脆弱性
Facebook Former President says the site was built to exploit vulnerability in human psychology.
Facebook首任总裁:社交网站是利用人类心理的脆弱性打造而成的.
结果: 518, 时间: 0.0361

单词翻译

顶级字典查询

英语 - 中文