| 1. | Incorrect use can create security weaknesses 不正确的使用可能会产生安全漏洞。 |
| 2. | Nt security drop - outs and suggestions for handling them 安全漏洞及其解决建议 |
| 3. | This method does not create any security holes 此方法不会产生任何安全漏洞。 |
| 4. | Could inadvertently open up a security hole 可能会无意中打开一个安全漏洞。 |
| 5. | ( 2 ) it designed a security holes scanning system ( 2 )设计了一个安全漏洞扫描系统。 |
| 6. | D . a . r . p . a . had to cover up the security breach Daepa必须掩盖这一安全漏洞 |
| 7. | Method could inadvertently open up a security hole 方法可能会无意中打开一个安全漏洞。 |
| 8. | It requires study to understand security vulnerabilities 它要求进行学习以了解安全漏洞。 |
| 9. | As should be obvious , this is a potential security hole 非常明显,这是一个潜在的安全漏洞。 |
| 10. | Impact of vulnerability : run code of an attacker s choice 安全漏洞的影响:运行攻击者选定的代码 |