Examples of using Successfully exploited in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
An attacker who successfully exploited the vulnerability could cause Office to stop responding.
His image of a rebel and a hooligan in the cinema is successfully exploited by him in life.
An attacker who successfully exploited the vulnerability could violate virtual trust levels(VTL).
The zero-day affects all Windows 10versions with UMCI enabled, Forshaw successfully exploited it on Windows 10S.
An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
An attacker who successfully exploited this vulnerability could read data not intended to be disclosed.
An attacker who successfully exploited this vulnerability could decrypt encrypted SSL/TLS traffic.
An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
An attacker who successfully exploited this vulnerability could cause a denial of service against a.
An attacker who successfully exploited this vulnerability would be able to read data which was not intended to be disclosed.
An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.
An attacker who successfully exploited this vulnerability would be able to read data which was not intended to be disclosed.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the user s system.
An attacker who successfully exploited this vulnerability would need to send a specially crafted link and convince a user to click the link.
An attacker who successfully exploited this vulnerability would be able to read data, such as the view state, which was encrypted by the server.
An attacker who successfully exploited this vulnerability could cause a denial of service against a. NET Framework.
An attacker who successfully exploited this vulnerability could cause the affected system to stop responding until it is manually restarted.
In most scenarios, an attacker who successfully exploited this issue could gain information disclosure of a victim's domain credentials from the targeted device.
An attacker who successfully exploited this vulnerability could then perform actions on the IIS server with the same rights as the Worker Process Identity(WPI).
An attacker who successfully exploited this vulnerability could view content from the local computer or browser window in another domain or Internet Explorer zone.
An attacker who successfully exploited the vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system.
An attacker who successfully exploited this vulnerability could cause an information disclosure to bypass the ASLR security feature that protects users from a broad class of vulnerabilities.
An attacker who successfully exploited this vulnerability could cause a denial of service against a. NET Framework,. NET Core, or. NET native application.
In 1900, André Citroën successfully exploits a patent for gears with a chevron layout.