中国开发网: 论坛: 程序员情感CBD: 贴子 234893
zhong
远程登陆
An attacker could also access the affected component through another vector. For example, an attacker could log on to the system interactively or by using another program that passes parameters to the vulnerable component (locally or remotely). To locally exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially-designed application that could exploit the vulnerability, and thereby gain complete control over the affected system.

相关信息:


欢迎光临本社区,您还没有登录,不能发贴子。请在 这里登录