Eksempler på bruk av An attacker who successfully på Engelsk og deres oversettelse til Norsk
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
An attacker who successfully exploits this vulnerability in software by using.
These updates address vulnerabilities that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system.
An attacker who successfully exploited this vulnerability could gain access to the SAM database.
This update addresses vulnerabilities that could allow an attacker who successfully exploits these vulnerabilities to run malicious code on the affected system.
An attacker who successfully exploits this vulnerability could take control of the affected system.
An attacker who successfully exploited the vulnerability could gain additional database and file information.
An attacker who successfully exploited this vulnerability could gain the same privileges as the user.
An attacker who successfully exploits this vulnerability could take control of an affected system.
An attacker who successfully exploited this vulnerability could gain the same user rights as the local user.
An attacker who successfully exploited this vulnerability could take complete control of the affected system.
An attacker who successfully exploited this vulnerability could run malicious code on a users system.
An attacker who successfully exploited this vulnerability would be able to run code with Local System privileges on an affected system.
An attacker who successfully exploits this vulnerability could relay user credentials and use them to execute code on the target system.
An attacker who successfully exploits these vulnerabilities might be able to run code with Local System rights on an affected computer, or could cause RPCSS to stop working.
An attacker who successfully exploited these vulnerabilities could be able to run code with Local System privileges on an affected system, or could cause the RPCSS Service to fail.
An attacker who successfully exploited this vulnerability could allow remote code execution with System privileges on an affected system, or an attacker could cause the Workstation service to fail.
An attacker who successfully exploits the vulnerability can run code in the security context of the user, and as a result, an attacker can gain the same privileges as the user on the computer.
An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.