Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.
最后是三个漏洞:一个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞的,最后是利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。
Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.
最后是三个漏洞:一个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞的,最后是利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。
应用推荐