Trying to learn how to translate from the human translation examples.
From professional translators, enterprises, web pages and freely available translation repositories.
it makes use of the following exploits: - ms01-059 (unchecked buffer in universal plug and play) - ms02-018 (patch for internet information service) - ms02-061 (elevation of privilege in sql server web) - ms03-007 (unchecked buffer in windows component) - ms03-026 (buffer overrun in rpc interface) - ms03-049 (buffer overrun in the workstation service) - ms04-007 (asn.1 vulnerability) - ms04-011 (lsass vulnerability) - ms05-039 (vulnerability in plug and play) - bagle backdoor (port 2745) - kuang backdoor (port 17300) - mydoom backdoor (port 3127) - netdevil backdoor (port 903) - optix backdoor (port 3140) - subseven backdoor (port 27347) - dameware remote administration (port 6129)
sfrutta le seguenti vulnerabilità: - ms01-059 (unchecked buffer in universal plug and play) - ms02-018 (patch for internet information service) - ms02-061 (elevation of privilege in sql server web) - ms03-007 (unchecked buffer in windows component) - ms03-026 (buffer overrun in rpc interface) - ms03-049 (buffer overrun in the workstation service) - ms04-007 (asn.1 vulnerability) - ms04-011 (lsass vulnerability) - ms05-039 (vulnerability in plug and play) - bagle backdoor (port 2745) - kuang backdoor (port 17300) - mydoom backdoor (port 3127) - netdevil backdoor (port 903) - optix backdoor (port 3140) - subseven backdoor (port 27347) - dameware remote administration (port 6129)
Last Update: 2017-01-11
Usage Frequency: 3
Quality: