검색어: (ms03 023) buffer overrun in html converter patch (영어 - 스페인어)

영어

번역기

(ms03 023) buffer overrun in html converter patch

번역기

스페인어

번역기
번역기

Lara로 텍스트, 문서 및 음성을 즉시 번역

지금 번역하기

인적 기여

전문 번역가, 번역 회사, 웹 페이지 및 자유롭게 사용할 수 있는 번역 저장소 등을 활용합니다.

번역 추가

영어

스페인어

정보

영어

it makes use of the following exploit: - ms03-026 (buffer overrun in rpc interface)

스페인어

emplea la siguiente brecha de seguridad: - ms03-026 (buffer overrun in rpc interface)

마지막 업데이트: 2017-02-14
사용 빈도: 9
품질:

영어

it makes use of the following exploits: - ms03-026 (buffer overrun in rpc interface) - ms04-011 (lsass vulnerability)

스페인어

emplea las siguientes brechas de seguridad: - ms03-026 (buffer overrun in rpc interface) - ms04-011 (lsass vulnerability)

마지막 업데이트: 2017-02-14
사용 빈도: 10
품질:

영어

it makes use of the following exploit: - ms03-039 (buffer overrun in rpcss service) - ms04-011 (lsass vulnerability)

스페인어

emplea la siguiente brecha de seguridad: - ms03-039 (buffer overrun in rpcss service) - ms04-011 (lsass vulnerability)

마지막 업데이트: 2016-12-28
사용 빈도: 1
품질:

영어

it makes use of the following exploits: - ms03-049 (buffer overrun in the workstation service) - ms04-011 (lsass vulnerability)

스페인어

emplea las siguientes brechas de seguridad: - ms03-049 (buffer overrun in the workstation service) - ms04-011 (lsass vulnerability)

마지막 업데이트: 2017-01-02
사용 빈도: 2
품질:

영어

it makes use of the following exploits: - ms03-049 (buffer overrun in the workstation service) - ms05-039 (vulnerability in plug and play)

스페인어

emplea las siguientes brechas de seguridad: - ms03-049 (buffer overrun in the workstation service) - ms05-039 (vulnerability in plug and play)

마지막 업데이트: 2017-01-02
사용 빈도: 2
품질:

영어

it makes use of the following exploits: - ms03-026 (buffer overrun in rpc interface) - ms04-011 (lsass vulnerability) - ms05-039 (vulnerability in plug and play)

스페인어

emplea las siguientes brechas de seguridad: - ms03-026 (buffer overrun in rpc interface) - ms04-011 (lsass vulnerability) - ms05-039 (vulnerability in plug and play)

마지막 업데이트: 2017-01-02
사용 빈도: 2
품질:

영어

it makes use of the following exploits: - ms03-026 (buffer overrun in rpc interface) - ms04-007 (asn.1 vulnerability) - ms05-039 (vulnerability in plug and play)

스페인어

emplea las siguientes brechas de seguridad: - ms03-026 (buffer overrun in rpc interface) - ms04-007 (asn.1 vulnerability) - ms05-039 (vulnerability in plug and play)

마지막 업데이트: 2017-02-13
사용 빈도: 1
품질:

영어

it makes use of the following exploits: - ms03-039 (buffer overrun in rpcss service) - ms04-007 (asn.1 vulnerability) - ms06-040 (vulnerability in server service)

스페인어

emplea las siguientes brechas de seguridad: - ms03-039 (buffer overrun in rpcss service) - ms04-007 (asn.1 vulnerability) - ms06-040 (vulnerability in server service)

마지막 업데이트: 2017-02-14
사용 빈도: 6
품질:

영어

it makes use of the following exploits: - ms03-007 (unchecked buffer in windows component) - ms03-039 (buffer overrun in rpcss service) - ms06-040 (vulnerability in server service)

스페인어

emplea las siguientes brechas de seguridad: - ms03-007 (unchecked buffer in windows component) - ms03-039 (buffer overrun in rpcss service) - ms06-040 (vulnerability in server service)

마지막 업데이트: 2017-02-13
사용 빈도: 2
품질:

영어

it makes use of the following exploits: - ms02-061 (elevation of privilege in sql server web) - ms03-026 (buffer overrun in rpc interface) - ms03-039 (buffer overrun in rpcss service)

스페인어

emplea las siguientes brechas de seguridad: - ms02-061 (elevation of privilege in sql server web) - ms03-026 (buffer overrun in rpc interface) - ms03-039 (buffer overrun in rpcss service)

마지막 업데이트: 2017-02-14
사용 빈도: 1
품질:

영어

it makes use of the following exploits: - ms03-026 (buffer overrun in rpc interface) - ms04-007 (asn.1 vulnerability) - ms04-011 (lsass vulnerability) - ms05-039 (vulnerability in plug and play)

스페인어

emplea las siguientes brechas de seguridad: - ms03-026 (buffer overrun in rpc interface) - ms04-007 (asn.1 vulnerability) - ms04-011 (lsass vulnerability) - ms05-039 (vulnerability in plug and play)

마지막 업데이트: 2017-01-02
사용 빈도: 2
품질:

영어

it makes use of the following exploits: - ms03-026 (buffer overrun in rpc interface) - ms03-049 (buffer overrun in the workstation service) - ms04-011 (lsass vulnerability) - ms05-039 (vulnerability in plug and play)

스페인어

emplea las siguientes brechas de seguridad: - ms03-026 (buffer overrun in rpc interface) - ms03-049 (buffer overrun in the workstation service) - ms04-011 (lsass vulnerability) - ms05-039 (vulnerability in plug and play)

마지막 업데이트: 2017-02-14
사용 빈도: 3
품질:

영어

it makes use of the following exploits: - ms03-026 (buffer overrun in rpc interface) - ms03-049 (buffer overrun in the workstation service) - ms04-007 (asn.1 vulnerability) - ms05-039 (vulnerability in plug and play)

스페인어

emplea las siguientes brechas de seguridad: - ms03-026 (buffer overrun in rpc interface) - ms03-049 (buffer overrun in the workstation service) - ms04-007 (asn.1 vulnerability) - ms05-039 (vulnerability in plug and play)

마지막 업데이트: 2016-12-28
사용 빈도: 4
품질:

영어

it makes use of the following exploits: - ms01-059 (unchecked buffer in universal plug and play) - ms03-026 (buffer overrun in rpc interface) - ms03-039 (buffer overrun in rpcss service) - ms04-007 (asn.1 vulnerability)

스페인어

emplea las siguientes brechas de seguridad: - ms01-059 (unchecked buffer in universal plug and play) - ms03-026 (buffer overrun in rpc interface) - ms03-039 (buffer overrun in rpcss service) - ms04-007 (asn.1 vulnerability)

마지막 업데이트: 2017-02-14
사용 빈도: 3
품질:

영어

it makes use of the following exploits: - ms03-026 (buffer overrun in rpc interface) - ms03-039 (buffer overrun in rpcss service) - ms03-049 (buffer overrun in the workstation service) - ms04-007 (asn.1 vulnerability) - ms04-011 (lsass vulnerability)

스페인어

emplea las siguientes brechas de seguridad: - ms03-026 (buffer overrun in rpc interface) - ms03-039 (buffer overrun in rpcss service) - ms03-049 (buffer overrun in the workstation service) - ms04-007 (asn.1 vulnerability) - ms04-011 (lsass vulnerability)

마지막 업데이트: 2017-02-14
사용 빈도: 8
품질:

인적 기여로
8,927,591,082 더 나은 번역을 얻을 수 있습니다

사용자가 도움을 필요로 합니다:



당사는 사용자 경험을 향상시키기 위해 쿠키를 사용합니다. 귀하께서 본 사이트를 계속 방문하시는 것은 당사의 쿠키 사용에 동의하시는 것으로 간주됩니다. 자세히 보기. 확인