A security vulnerability exists in Microsoft. NET Framework 4.6.2 that could allow an attacker to access information that is defended by the Always Encrypted feature.
IDN漏洞允许攻击者在非Microsoft浏览器上创建虚假网站,以便引发网络钓鱼诈骗。
The IDN vulnerability allowed an attacker to create a fake Web site on a non-Microsoft browser in order to pull off a phishing scam.
所有8个漏洞都可能被利用来破坏内存,允许攻击者在当前用户的上下文中执行代码。
All of these 8 errors could be exploited to corrupt the memory, allowing an attacker to execute code in the context of the current user.
此漏洞可能允许攻击者欺骗IPv4地址,以便它可绕过依赖源IPv4地址的筛选设备。
This vulnerability could allow an attacker to spoof an IPv4 address so that it may bypass filtering devices that rely on the source IPv4 address.
披露(Discovery)包括允许攻击者获得有关系统和内部网络的知识的技术。
Discovery allows an attacker to gain knowledge about the system and internal network.
由于该脚本是微软签名的,因此将以完整语言模式执行,允许攻击者执行任意C代码。
Since the script is Microsoft-signed, it executes in Full Language mode, allowing an attacker to execute arbitrary C.
Pre-installed in the Dell computer Support Software Dell System Detect is to discover the presence of vulnerabilities, allowing an attacker to remotely execute malicious code.
WPA3协议中发现的一系列漏洞可能允许攻击者获取Wi-Fi网络的密码.
A series of vulnerabilities discovered by researchers in the WPA3 protocol can allow an attacker to obtain the password of a Wi-Fi network.
Spectre1.2允许攻击者覆盖制度数据和代码指针,从而破坏不强制执行读写保护的CPU上的沙箱。
Spectre 1.2 allows an attacker to overwrite read-only data and code pointers to breach sandboxes on CPUs that don't enforce read-write protections.
与此同时,其他研究人员也在研究一些允许攻击者从虚拟机中逃逸的漏洞。
At the same time, other researchers are also looking at allowing an attacker to escape from the virtual machine vulnerability.
事实证明,这些VSAT系统中的一些是非常不安全的,并且可能允许攻击者获得访问权限并中断通信。
Turns out, some of these VSAT systems are profoundly insecure, and could allow an attacker to gain access, and disrupt communications.
指允许攻击者违反显式或隐式的安全策略的一组条件。
A set of conditions that allows an attacker to violate an explicit or implicit security policy.
Most web servers, use Bash to process certain commands, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands.
Adobe表示:“该高危漏洞能够导致崩溃并潜在的允许攻击者接管受影响的系统。
Adobe reports that the said security vulnerability“could cause a crash and potentially allow an attacker to take control of the affected system.”.
如果这是个流氓WAP,这可能允许攻击者访问企业中不安全的客户端网络。
If the WAP is rogue, this potentially allows an attacker to access an unsecure client network in an enterprise.
此外,使用不安全的公共无线互联网或WiFi点可能允许攻击者连接到该设备,并查看敏感信息。
In addition, using unsecured public wireless Internet networks or WiFi spots could allow an attacker to connect to the device and view sensitive information.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt