What is the translation of " THE EXPLOIT " in Chinese?

[ðə 'eksploit]
Noun
Verb
[ðə 'eksploit]
漏洞
该漏洞

Examples of using The exploit in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
The backdoor serves to protect the exploit.
后门程序的作用在于保护exploit
On x64, though, the exploit took 70 minutes to complete.
不过在x64平台上,漏洞需要70分钟才能达到目的。
Among the underground faithful, it's widely assumed that the Exploit.
地下犯罪分子广泛认为exploit.
Thankfully, we managed to capture the exploit during dynamic analysis.
但幸运的是,我们在动态分析中成功捕获了漏洞
Meanwhile, the researchers published their security analysis of the exploit.
同时,研究人员发表了他们对该漏洞的安全性分析。
The exploit was designed for Flash Player versions prior to 10.3 and 11.2.
一漏洞利用程序主要针对10.3和11.2之前版本的FlashPlayer。
The experts included the following bash version of the exploit code:.
专家发布以下bash版本的漏洞利用代码:.
The exploit had won him the Order of Lenin,the Soviet Union's highest award.
这项剥削使他赢得了列宁勋章,苏联最高奖。
Google initially refused the request,but eventually agreed a deadline of September 21st to disclose the exploit.
谷歌最初拒绝了这个请求,但最终协议披露漏洞的最后期限是9月21日。
Researchers warn the exploit can be used for darker purposes than just gathering extra likes.
研究人员警告说,利用可以用于更暗的目的,而不仅仅是收集额外的喜欢。
Google initially refused the request,but eventually agreed a deadline of September 21st to disclose the exploit.
谷歌最初拒绝了这一要求,但最终还是同意将公开这些漏洞的日期延迟到9月21日。
The exploit worked faster on the x86 platform, achieving its purpose in ten minutes;
利用在x86平台上运行的更快,在10分钟之内就能实现其目的;.
Buckeye's use of Equation Group tools also involved the exploit of a previously unknown Windows zero-day vulnerability.
Buckeye使用方程式组织工具还涉及利用以前未知的Windows的0day漏洞。
The exploit has been documented by its original author and has been covered by security researchers and CERTs.
该漏洞已被其原作者记录,并已被securityresearchers安全研究人员和CERTs所涵盖。
Because no user intervention is required the exploit could spread from computer to computer like wildfire, taking down the whole system.
因为不需要用户干预,攻击可像野火一样从计算机传播到另一台计算机,从而导致整个系统受到攻击。
The exploit would have dismantled the operation, but the researchers lacked the legal authority to push ahead.
该漏洞将拆除该操作,但研究人员缺乏推进的法律授权。
Once the right bits are flipped in the token, the exploit developer needs only to run one of the modules from our project.
一旦在令牌中翻转了正确的位,漏洞开发者只需要从我们的项目中运行其中一个模块就行了。
If the exploit is successful, it will gain arbitrary read and write operations within the memory, allowing it to execute a shellcode.
如果利用成功,它将在内存中获得任意读/写操作,从而允许它执行第二阶段的shellcode。
Once it is done running the exploit, it will install Cydia and its packages list on the device.
一旦利用程序(exploit)运行完毕,它就会安装Cydia和Cydia的包列表到设备上。
If the exploit is successful, it will gain arbitrary read/ write operations within memory, thus allowing it to execute a second stage shellcode.
如果利用成功,它将在内存中获得任意读/写操作,从而允许它执行第二阶段的shellcode。
And the other icon shows that the exploit has been published, so we can download those exploits from the exploit db.
其他图标显示漏洞已发布的exp,所以我们可以从exploit-db下载这些漏洞并利用此漏洞。
Though the exploit doesn't affect ethereum as a whole, some in the community are worried the consequences will be far-reaching nonetheless.
尽管该漏洞并未影响整体以太坊网络,但社区中的一些人还是担心会造成深远影响。
The team warns the exploit can be used for darker purposes than just gathering extra likes.
研究人员警告说,利用可以用于更暗的目的,而不仅仅是收集额外的喜欢。
Though the exploit doesn't affect ethereum as a whole, some in the community are worried the consequences will be far-reaching nonetheless.
虽然该漏洞并不影响以太坊这一整体,但社区的一些人仍担心,该事件的后果将是深远的。
Kaspersky has seen the exploit being used against less than a dozen targets located in the Middle East.
卡巴斯基目前已经在中东发现该漏洞被用来攻击十多个目标。
The exploit was demonstrated Tuesday at the Blackhat security conference in London by Ryan Welton, a researcher with security firm NowSecure.
漏洞是在星期二的伦敦黑帽安全大会上被一名来自nowsecure安全公司的研究员-Ryan威尔顿所证实的。
Before we ran the exploit against the target server, we set up the software locally to check it would all work as intended.
在目标服务器上运行exploit之前,我们要在本地搭设相应的软件,以检查它是否完全按预期工作。
The exploit module could also bring trouble for corporates which are hesitant when it comes to keeping their software up-to-date, mostly due to compatibility issues.
利用模块也可能会给企业带来麻烦,企业在软件更新时犹豫不决,主要考虑的是兼容性方面的问题。
The exploit for this vulnerability is an RTF document containing a DOCX document that exploits СVE-2017-11826 in the Office Open XML parser.
针对这种漏洞的漏洞利用程序是一个RTF文档,包含一个能够利用OfficeOpenXML解析器中CVE-2017-11826漏洞的DOCX文档。
Results: 29, Time: 0.0446

Word-for-word translation

Top dictionary queries

English - Chinese