영어에서 Exploited this vulnerability 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
An attacker who successfully exploited this vulnerability could then perform actions on the IIS server with the same rights as the Worker Process Identity(WPI).
An attacker who successfully exploited this vulnerability could read data not intended to be disclosed.
An attacker who successfully exploited this vulnerability could view content from the local computer or browser window in another domain or Internet Explorer zone.
An attacker who successfully exploited this vulnerability could decrypt encrypted SSL/TLS traffic.
An attacker who successfully exploited this vulnerability could cause an information disclosure to bypass the ASLR security feature that protects users from a broad class of vulnerabilities. .
An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
An attacker who successfully exploited this vulnerability could cause a denial of service against a.
An attacker who successfully exploited this vulnerability would be able to read data which was not intended to be disclosed.
An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.
An attacker who successfully exploited this vulnerability would be able to read data which was not intended to be disclosed.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the user s system.
An attacker who successfully exploited this vulnerability would need to send a specially crafted link and convince a user to click the link.
An attacker who successfully exploited this vulnerability would be able to read data, such as the view state, which was encrypted by the server.
An attacker who successfully exploited this vulnerability could cause a denial of service against a. NET Framework.
An attacker who successfully exploited this vulnerability could cause the affected system to stop responding until it is manually restarted.
An attacker who successfully exploited this vulnerability could cause a denial of service against a. NET Framework,. NET Core, or. NET native application.
An attacker could exploit this vulnerability….
An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link.
An attacker who exploits this vulnerability could cause the affected system to stop responding and to restart.
There are certain conditions that need to be met before an attacker can exploit this vulnerability.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the. NET Framework application.
A malicious user could exploit this vulnerability in either of two ways.
Attacker could exploit this vulnerability.
How do attackers exploit this vulnerability?
User interaction is required to exploit this vulnerability.
To exploit this vulnerability, user interaction is required.
To exploit this vulnerability an attacker must have valid credentials.
Only attackers on the local subnet would be able to exploit this vulnerability.