成功利用此漏 in English translation

an attacker who successfully exploited this
an attacker who successfully exploits this

Examples of using 成功利用此漏 in Chinese and their translations into English

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
成功利用此漏洞的攻击者可以读取另一个InternetExplorer安全域或本地计算机中的数据。
An attacker who successfully exploits this vulnerability could read data from another Internet Explorer domain or the local computer.
成功利用此漏洞的攻击者可能违反了VTL(VirtualTrustLevel,虚拟信任级别)。
An attacker who successfully exploited the vulnerability could violate virtual trust levels(VTL).
微软的顾问称:“成功利用此漏洞的攻击者可以跨信任边界读取特权数据。
Microsoft said:"An attacker who successfully exploited these vulnerabilities may be able to read privileged data across trust boundaries.
成功利用此漏洞的攻击者可能会读取受影响的InternetExplorer版本中本地文件的内容。
An attacker who successfully exploited the vulnerability could read the content of local files in affected versions of Internet Explorer.
成功利用此漏洞的攻击者还可以读取目标服务器上网站目录或子目录中文件的数据。
An attacker who successfully exploited this vulnerability could also read data from files on the target server which exist in the website directory or subdirectories.
微软在一份声明中表示:“成功利用此漏洞的攻击者可以获得当前用户的同等权限。
According to Microsoft:“An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.
成功利用此漏洞的攻击者可以测试盘上是否存在文件。
An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
成功利用此漏洞的攻击者可能会读取非有意泄漏的数据。
An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.
成功利用此漏洞的攻击者可能会导致Hyper-V系统停止响应。
An attacker who successfully exploited this vulnerability could cause the affected Hyper-V system to stop responding.
成功利用此漏洞的攻击者可能会读取非有意泄漏的数据。
An attacker who successfully exploited this vulnerability would be able to read data which was not intended to be disclosed.
成功利用此漏洞的攻击者可以绕过访问限制来添加或删除文件。
An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files.
成功利用此漏洞的攻击者可从无特权用户帐户提升权限至管理员帐户。
An attacker who successfully exploited this vulnerability could elevate the attacker's permissions from unprivileged user account to administrator.
成功利用此漏洞的攻击者可能导致受影响的系统停止响应和重新启动。
An attacker who exploits this vulnerability could cause the affected system to stop responding and to restart.
成功利用此漏洞且经过身份验证的攻击者可以读取关于目标系统的敏感信息。
An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system.
成功利用此漏洞的攻击者可能导致受影响的系统停止响应和重新启动。
An attacker who successfully exploited this vulnerability could cause the target system to stop responding and restart.
成功利用此漏洞的攻击者可以使一个未签名的文件看起来已经签名。
An attacker who successfully exploited this vulnerability could make an unsigned file appear to be signed.
成功利用此漏洞的攻击者可以确定受影响浏览器中所有网页的来源。
An attacker who successfully exploited this vulnerability could determine the origin of all webpages in the affected browser.
成功利用此漏洞的攻击者可以通过将用户重定向到恶意网站来欺骗用户。
An attacker who successfully exploited this vulnerability could trick a user by redirecting them to a malicious website.
成功利用此漏洞的攻击者可能会导致SMTP服务停止响应,直至重新启动为止。
An attacker who successfully exploited this vulnerability could cause the SMTP service to stop responding until restarted.
成功利用此漏洞的攻击者可以读取另一个InternetExplorer域中的网页的数据。
An attacker who successfully exploited this vulnerability could view data from a Web page in another Internet Explorer domain.
Results: 71, Time: 0.0172

Word-for-word translation

Top dictionary queries

Chinese - English