在 英语 中使用 To exploit this vulnerability 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
Does EMET help mitigate attacks that could attempt to exploit this vulnerability?
To exploit this vulnerability, an attacker would need to send a specially crafted WiFi packet.
The researcher has also written a Metasploit module to exploit this vulnerability.
User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.
At the time this release was issued, Microsoft was aware of limited,targeted attacks attempting to exploit this vulnerability.
To exploit this vulnerability via SNMP Version 3, the attacker must know the user credentials for the affected system.
Microsoft is aware of targeted attacks that attempt to exploit this vulnerability through Internet Explorer 8.
To exploit this vulnerability, Richard sprays the heap with interleaved Javascript Arrays and ArrayBuffers.
Blocking Port 135 at the firewall will preventsystems behind that firewall from being attacked by attempts to exploit this vulnerability.
To exploit this vulnerability an attacker could send a specially crafted URI request containing international characters to a.
When this security bulletin was issued, Microsoft was aware of limited,targeted attacks that attempt to exploit this vulnerability.
To exploit this vulnerability, an attacker would have to send a specially crafted HTTP request to the affected system.
Blocking TCP port 445 at the firewall will helpprotect systems that are behind that firewall from attempts to exploit this vulnerability.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
At the time this security bulletin was originally issued,Microsoft was unaware of any attack attempting to exploit this vulnerability.
To exploit this vulnerability via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for an affected system.
An attacker must have valid logon credentials to arealm trusted by the Windows Domain Controller in order to exploit this vulnerability.
Most attempts to exploit this vulnerability would result in a system denial of service condition, however remote code execution is theoretically possible.
Blocking this protocol type at the firewall will helpprotect systems that are behind that firewall from attempts to exploit this vulnerability.
TCP ports 139 and 445 should be blocked at thefirewall to protect systems behind the firewall from attempts to exploit this vulnerability.
Disabling the Computer Browser and Server service on the affected systems willhelp protect systems from remote attempts to exploit this vulnerability.
To exploit this vulnerability, an attacker could use social engineering tactics to lure a user into installing a specially crafted partial trust application.
Blocking this port at the network perimeter firewall will helpprotect systems that are behind that firewall from attempts to exploit this vulnerability.
Blocking this port at the network perimeter firewall will helpprotect systems that are behind that firewall from attempts to exploit this vulnerability.
In addition, we are actively working with partners to monitor the threat landscape andtake action against malicious sites that attempt to exploit this vulnerability.
On Windows 2000 Service Pack 4 any anonymous user who could deliver a specially craftedmessage to the affected system could try to exploit this vulnerability.