Мы используем Cookies Этот веб-сайт использует cookie-файлы, чтобы предлагать вам наиболее актуальную информацию. Просматривая этот веб-сайт, Вы принимаете cookie-файлы.
Знаете ли вы? Кликните два раза на слово, чтобы найти его в TermGallery.
Значения термина exploit the vulnerability на английском
Значения для термина "exploit the vulnerability" отсутствуют.
Использование термина exploit the vulnerability на английском
1
Furthermore, an attacker needs deep access to individual mobile units to exploitthevulnerability.
2
They then rush to work out attacks that would exploitthevulnerability on unpatched products.
3
What is more surprising is that fellow countrymen could exploitthevulnerability of these migrants.
4
Within 24 hours Dolan-Gavitt saw someone trying to exploitthevulnerability, with a few attempts every day since.
5
Its release gave criminal hackers a blueprint they could use to build malicious software that would exploitthevulnerability.
6
But he said that to exploitthevulnerability, a site would have to be actively seeking to do so.
7
This attack also opened the door for groups of hackers to exploitthevulnerability and install spyware on users' phones.
8
We try to act sensitively at times of stress and trauma, and we do not exploitthevulnerability of individuals.
9
But Cui and Pantoga's research automates that process, and even automatically develops the code that would reliably exploitthevulnerability.
10
Attackers could exploitthevulnerability by tricking users into visiting a malicious site that hosts a rigged image file, Microsoft's advisory warned .
11
But once it is publicized, other hackers could race to exploitthevulnerability before Windows users update their systems, which often does not happen immediately.
12
The FDA said the benefits of continuing treatment outweighed cyber risks, and DHS said only an attacker "with high skill" could exploitthevulnerability.
13
Hackers can exploitthevulnerability -rated "important" for Office but "critical" for Visual Basic -by duping users into opening rigged Office documents.
14
Approximately 1,700 computer security professionals and corporate executives attended that conference, where an SPI Dynamics researcher detailed precisely how to exploitthevulnerability.
15
Pleshchuk and Covelin then worked on exploitingthevulnerabilities to obtain access.
16
The company said it has seen no active in-the-wild attacks exploitingthevulnerability.