"利用此漏洞" is not found on TREX in Chinese-English direction
Try Searching In English-Chinese (利用此漏洞)

Low quality sentence examples

利用此漏洞,攻击者需要通过RDP向目标系统RD网关发送特制请求。
To exploit these vulnerabilities, an attacker would need to send a specially crafted request to the target systems RD Gateway via RDP.
利用此漏洞的大多数尝试将导致受影响的系统停止响应和重新启动。
Most attempts to exploit this vulnerability will cause an affected system to stop responding and restart.
禁用这些服务有助于保护受影响的系统,防止遭受利用此漏洞的尝试。
This setting will help protect the affected system from attempts to exploit this vulnerability.
当时此安全公告最初发布,Microsoft没有收到关于尝试利用此漏洞的任何攻击。
At the time this security bulletin was originally issued, Microsoft was unaware of any attack attempting to exploit this vulnerability.
利用此漏洞,用户必须在WindowsMediaPlayer中打开经特殊设计的DataObject。
To exploit this vulnerability a user must open a specially crafted DataObject in Windows Media Player.
无法自动利用此漏洞.
The vulnerability cannot be exploited automatically;
成功利用此漏洞可能会导致信息泄露。
Successful exploitation of this vulnerability can lead to information leakage.
要试图利用此漏洞,需要进行用户交互。
Attempts to exploit this vulnerability would require user interaction.
成功利用此漏洞可能会导致信息泄露。
Successful exploitation of this vulnerability may result in information leakage.
利用此漏洞,攻击者首先必须登录系统。
To exploit this vulnerability, an attacker would first have to log on to the system.
利用此漏洞可能会导致Internet出现重大问题。
The exploitation of this vulnerability could cause major problems on the Internet.
NET2003编译的软件应用程序才能利用此漏洞
NET 2003 can be used to exploit this vulnerability.
利用此漏洞,攻击者需要发送特制的WiFi数据包。
To exploit this vulnerability, an attacker would need to send a specially crafted WiFi packet.
但是,本地网络上的攻击者可能会利用此漏洞
However, an attacker on the local network may be able to exploit this vulnerability.
此设置将帮助防止受影响的系统尝试利用此漏洞
This setting will help protect the affected system from attempts to exploit this vulnerability.
利用此漏洞,攻击者需要发送一个精心编制的Wi-Fi包。
To exploit this vulnerability, an attacker would need to send a specially crafted WiFi packet.
若要利用此漏洞,攻击者需要创建或修改数据库的权限。
To exploit this vulnerability an attacker would need permissions to create or modify a database.
NET2003编译的应用程序可以被用来利用此漏洞进行攻击。
NET 2003 can be used to exploit this vulnerability.
利用此漏洞,攻击者首先必须在受攻击系统上执行。
To exploit this vulnerability, an attacker would first have to gain access to the system.
Microsoft已注意到尝试通过InternetExplorer8利用此漏洞的针对性攻击。
Microsoft is aware of attacks that attempt to exploit this vulnerability through Internet Explorer 8.