An attacker could exploit this vulnerability, and run programs as if he or she were the user.

 
  • 攻击者可利用此漏洞运行程序,就像他或她是用户一样。
今日热词
目录 附录 查词历史