Примери за използване на Attacker could на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
An attacker could install programs;
This version addresses a vulnerability that an attacker could exploit to take control of an affected system.
The attacker could then install programs;
This version addresses multiple vulnerabilities that an attacker could exploit to obtain sensitive information.
So our attacker could have been anyone?
Beware that this doesn't provide strong security,because cFos PNet must know the decryption method and therefore an attacker could extract the password.
An attacker could exploit this vulnerability to execute code on the host.
This version addresses multiple vulnerabilities that an attacker could exploit to take control of an affected system.
Remote attacker could exploit this vulnerability to access the RomPager….
But Patrick Kiley, Rapid7's lead researcher on the issue,said an attacker could exploit the vulnerability with access to a plane or by bypassing airport security.
An attacker could exploit this vulnerability to obtain sensitive information.
We present and demonstrate a practical attack(achievable in a few minutes) whereby an attacker could forge a signature on an IOTA payment, and potentially use this forged signature to steal funds from another IOTA user.
An attacker could exploit these vulnerabilities to obtain sensitive information.
The Chinese researchers suggested an attacker could embed hidden ultrasonic commands in online videos, or broadcast them in public while near a victim.
An attacker could exploit this vulnerability to cause a denial-of-service condition.
The cybersecurity firm, Rapid7, found that an attacker could potentially disrupt electronic messages transmitted across a small plane's network, for example by attaching a small device to its wiring, that would affect aircraft systems.
An attacker could exploit this vulnerability to take control of an affected system.
An attacker could exploit these vulnerabilities to obtain access to sensitive information.
An attacker could exploit this vulnerability to take control of an affected website.
An attacker could exploit these vulnerabilities to take control of an affected system.
An attacker could exploit these vulnerabilities to cause a denial-of-service condition.
An attacker could exploit this vulnerability to take control of an affected system.
An attacker could exploit these vulnerabilities to obtain access to sensitive information.
An attacker could exploit this vulnerability to cause a denial-of-service condition.
An attacker could exploit this vulnerability to take control of an affected system.
An attacker could exploit these vulnerabilities to take control of an affected system.
An attacker could exploit some of these vulnerabilities to take control of an affected website.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
An attacker could send very long passwords that would cause excessive CPU use in crypt(3).
Fixed: An attacker could have access phpMyAdmin from remote servers bypassing the XAMPP security approach.