영어에서 Attacker who successfully 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
An attacker who successfully exploited the vulnerability could cause Office to stop responding.
In most scenarios, an attacker who successfully exploited this issue could gain information disclosure of a victim's domain credentials from the targeted device.
An attacker who successfully exploited the vulnerability could violate virtual trust levels(VTL).
An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
An attacker who successfully exploited this vulnerability could read data not intended to be disclosed.
An attacker who successfully exploited this vulnerability could decrypt encrypted SSL/TLS traffic.
An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
An attacker who successfully exploited this vulnerability would be able to read data which was not intended to be disclosed.
An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.
An attacker who successfully exploited this vulnerability would be able to read data which was not intended to be disclosed.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the user s system.
An attacker who successfully exploited this vulnerability would need to send a specially crafted link and convince a user to click the link.
An attacker who successfully exploited this vulnerability would be able to read data, such as the view state, which was encrypted by the server.
An attacker who successfully exploited this vulnerability could cause the affected system to stop responding until it is manually restarted.
An attacker who successfully exploited this vulnerability could then perform actions on the IIS server with the same rights as the Worker Process Identity(WPI).
An attacker who successfully exploited this vulnerability could view content from the local computer or browser window in another domain or Internet Explorer zone.
An attacker who successfully exploited the vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system.
An attacker who successfully exploited this vulnerability could cause an information disclosure to bypass the ASLR security feature that protects users from a broad class of vulnerabilities.
An attacker who successfully exploited this vulnerability could cause a denial of service against a. NET Framework,. NET Core, or. NET native application.