如果威胁者利用了这个漏洞,则会引起浏览器崩溃。
This vulnerability, if exploited by a threat, could result in a browser crash.
所以说,现在利用这一漏洞进行的攻击被称为“零日”攻击。
In turn the current exploiting of the flaw is known as a "zero-day" attack.
威胁的发生可能要利用多于一个漏洞。
It may take more than one vulnerability to be exploited before a threat can happen.
现在你需要2个bug,并进行两种漏洞的利用。
攻击者可能利用此漏洞做什么?
通常,计算机黑客和电脑病毒利用安全漏洞入侵计算机系统。
Usually hackers or computer virus intrude a computer system by security holes.
他们利用一切可能的漏洞,甚至违法犯罪。
They take advantage of every loophole possible and even break the law.
此缺陷可能导致可利用的安全漏洞或程序崩溃。
This defect might cause an exploitable security hole or a program crash.
此缺陷可能导致可利用的安全漏洞或程序崩溃。
This defect might cause an exploitable security hole or a program crash.
应用推荐