Examples of using To exploit this vulnerability in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
On Windows Server 2003 or systems with ADAM installed, the attacker must have valid authentication credentials in order to exploit this vulnerability.
Blocking Port 135 at the firewall will prevent systems behind that firewall from being attacked by attempts to exploit this vulnerability.
An attacker must have valid logon credentials and be able to send specially crafted content from a guest virtual machine to exploit this vulnerability.
On all other affected platforms, the attacker must have valid authentication credentials in order to exploit this vulnerability.
Microsoft has not identified any way to exploit this vulnerability on computers using these operating systems.
The attacker can use the“Out-of-Band Data Retrieval” attack technique to exploit this vulnerability that resides in MSXML3 parser.
Attempts to exploit this vulnerability would require user interaction.
NET 2003 can be used to exploit this vulnerability.
Microsoft is aware of limited active attacks that attempt to exploit this vulnerability.
This setting will help protect the affected system from attempts to exploit this vulnerability.
To exploit this vulnerability, an attacker could send specially crafted XML data to a.
This setting will help protect the affected system from attempts to exploit this vulnerability.
To exploit this vulnerability an attacker would need permissions to create or modify a database.
Microsoft is aware of attacks that attempt to exploit this vulnerability through Internet Explorer 8.
To exploit this vulnerability, an attacker would first have to log on to the system.
To exploit this vulnerability, an attacker would need to send a specially crafted WiFi packet.
Most attempts to exploit this vulnerability will cause an affected system to stop responding and restart.
To exploit this vulnerability, an attacker would first have to gain access to the system.
To exploit this vulnerability a user must open a specially crafted DataObject in Windows Media Player.
When this security bulletin was issued, Microsoft was aware of limited attacks that attempt to exploit this vulnerability.