Using this FTP-protocol based vulnerability, an attacker could potentially hide an attack by using the firewall identity against an unsuspecting and unprotected external machine.

 
  • 使用基于此 FTP 协议的易受攻击性,攻击者可能会使用不受怀疑和不受保护 外部计算机的防火墙身份隐藏攻击。
今日热词
目录 附录 查词历史