TO EXPLOIT THIS VULNERABILITY in Chinese translation

[tə 'eksploit ðis ˌvʌlnərə'biliti]
[tə 'eksploit ðis ˌvʌlnərə'biliti]
利用此漏洞
利用这些漏洞

Examples of using To exploit this vulnerability in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
On Windows Server 2003 or systems with ADAM installed, the attacker must have valid authentication credentials in order to exploit this vulnerability.
在WindowsServer2003或安装了ADAM的系统上,攻击者必须具有有效的身份验证凭据才能利用此漏洞
Blocking Port 135 at the firewall will prevent systems behind that firewall from being attacked by attempts to exploit this vulnerability.
在防火墙中禁止端口135有助于防止有人企图利用此漏洞防火墙后面的系统。
An attacker must have valid logon credentials and be able to send specially crafted content from a guest virtual machine to exploit this vulnerability.
攻击者必须拥有有效的登录凭据并能从客户虚拟机发送特制的内容才能利用此漏洞
On all other affected platforms, the attacker must have valid authentication credentials in order to exploit this vulnerability.
在所有受影响的平台上,攻击者必须具有管理员权限的有效验证凭据才能利用此漏洞
Microsoft has not identified any way to exploit this vulnerability on computers using these operating systems.
Microsoft尚未确定在使用这些操作系统的计算机上利用此漏洞的所有方式。
The attacker can use the“Out-of-Band Data Retrieval” attack technique to exploit this vulnerability that resides in MSXML3 parser.
攻击者可以使用“带外数据检索”攻击技术来利用驻留在MSXML3分析器中的此漏洞
Attempts to exploit this vulnerability would require user interaction.
要试图利用此漏洞,需要进行用户交互。
NET 2003 can be used to exploit this vulnerability.
NET2003编译的应用程序可以被用来利用此漏洞进行攻击。
Microsoft is aware of limited active attacks that attempt to exploit this vulnerability.
Microsoft获悉尝试使用此漏洞的有限攻击。
This setting will help protect the affected system from attempts to exploit this vulnerability.
设置将帮助防止受影响的系统尝试利用此漏洞
To exploit this vulnerability, an attacker could send specially crafted XML data to a.
若要利用此漏洞,攻击者可能将经特殊设计的XML数据发送.
This setting will help protect the affected system from attempts to exploit this vulnerability.
禁用这些服务有助于保护受影响的系统,防止遭受利用此漏洞的尝试。
To exploit this vulnerability an attacker would need permissions to create or modify a database.
若要利用此漏洞,攻击者需要创建或修改数据库的权限。
Microsoft is aware of attacks that attempt to exploit this vulnerability through Internet Explorer 8.
Microsoft已注意到尝试通过InternetExplorer8利用此漏洞的针对性攻击。
To exploit this vulnerability, an attacker would first have to log on to the system.
利用此漏洞,攻击者首先必须登录系统。
To exploit this vulnerability, an attacker would need to send a specially crafted WiFi packet.
利用此漏洞,攻击者需要发送一个精心编制的Wi-Fi包。
Most attempts to exploit this vulnerability will cause an affected system to stop responding and restart.
利用此漏洞的大多数尝试将导致受影响的系统停止响应和重新启动。
To exploit this vulnerability, an attacker would first have to gain access to the system.
利用此漏洞,攻击者首先必须在受攻击系统上执行。
To exploit this vulnerability a user must open a specially crafted DataObject in Windows Media Player.
利用此漏洞,用户必须在WindowsMediaPlayer中打开经特殊设计的DataObject。
When this security bulletin was issued, Microsoft was aware of limited attacks that attempt to exploit this vulnerability.
发布本安全公告时,Microsoft发现了试图利用此漏洞的有限数量的定向攻击。
Results: 147, Time: 0.0441

Word-for-word translation

Top dictionary queries

English - Chinese