英語 での Security hole の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Actual code that can use a security hole to carry out an attack.
The EOS“constitution” is socially unscalable and a security hole.
Among these reports, we have to pay attention to the following case.- An attacker tampered a home page by exploiting the security hole of Windows.
When our security engineers became aware of the issue Tuesday afternoon, we immediately began working on an update that closes the security hole.
If foo comes from untrusted user input, it may contain%n, causing the printf() call to write to memory and creating a security hole.
Some people(and yes, we know who) found a security hole on our web site(in fact, actually in this blog).__They have got a copy of the user database.
The $30,000 option will not require an internet connection and will allow unlimited attempts on unlimited devices, presumably until the security hole is patched.
A previously unknown security hole in Internet Explorer 7, 8 and 9 is being actively exploited to deliver a back door trojan known as"Poison Ivy," researchers warned.
What if there is vulnerability(ies)("security hole" in another word) in those who browsed website(s) previously altered, it will be exploited to infect virus to their computers.
According to Chipzilla, the security hole allows“an unprivileged attacker to gain control of the manageability features provided by these products.”.
which opens a security hole.
Otherwise, a security hole in the site you trusted to send only trusted messages could then open a cross-site scripting hole in your site.
A large number of developers are working with Drupal, and shortly after a bug or security hole is discovered, a fix is released.
In an advisory on January 14, 2010, Microsoft said that attackers targeting Google and other U.S. companies used software that exploits a security hole, which had already been patched, in Internet Explorer.
When a security hole was discovered in software such as Red Hat®Linux and the software company provided a patch for it, the system administrator had to apply the patch one by one to each individual server that ran the software.
One of remarkable instance from the virus/unauthorized reports for April and May filed with IPA was that"intruded to a computer from the security hole detected by the application software which manages the computer and damaged.
Those website developers and managers should conduct sufficient vulnerability measures and to perceive the significance which may be caused by SQL injection.* Vulnerability generally refers the weakness of security and is called"security hole" as well.
When this option is on, a user will be logged in again automatically when their session is interrupted by an X server crash; note that this can open a security hole: if you use a screen locker than KDE's integrated one, this will make circumventing a password-secured screen lock possible.
You chose the severity Grave. Please note that this severity is intended only for bugs that: make the package in question unusable or mostly so cause data loss introduce a security hole allowing access to the accounts of users who use the affected package Does the bug you are reporting cause any of the above damage? If it does not, please select a lower severity. Thank you.
You chose the severity Critical. Please note that this severity is intended only for bugs that: break unrelated software on the system(or the whole system) cause serious data loss introduce a security hole on the system where the affected package is installed Does the bug you are reporting cause any of the above damage? If it does not, please select a lower severity. Thank you.