Ví dụ về việc sử dụng Allow an attacker trong Tiếng anh và bản dịch của chúng sang Tiếng việt
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
to normally isolated data, possibly allowing an attacker to send an exploit that can access the data.
Added option in 2007, called Wi-Fi Protected Setup(WPS), had a serious flaw that allowed an attacker to recover the router password.
Remote code execution: This kind of flaw allows an attacker to run any command on the victim's computer--such as installing remote-control software that can effectively take over a PC.
But instead of code execution, this bug allows an attacker to read the content of files stored on the victim's iOS device through leaked memory.
The root of this issue was misconfigured cross-origin header implementation on Facebook's chat server domain, which allowed an attacker to bypass origin checks and access Facebook messages from an external website.
the vulnerability allows an attacker to run malicious code on the victim's computer, and in less dangerous situations,
This is known as a 51% attack and it allows an attacker to spend the same coins multiple times
This, in turn, allows an attacker to remotely execute arbitrary code on the Windows host operating system, eventually letting the attacker create,
The directory traversal vulnerability allows an attacker to move from a phone's Bluetooth shared folder into other folders, giving them access to contact details,
They said that the vulnerable apps could be exploited, allowing an attacker to steal highly sensitive usernames and passwords for Facebook, WordPress, Twitter, Google,
Many times in the past have been discovered security holes in Windows Media Player that allowed an attacker to execute malicious code on your computer, remote(remote).
In a press release published by the NSA, the agency explains"the certificate validation vulnerability allows an attacker to undermine how Windows verifies cryptographic trust and can enable remote code execution".
This allows an attacker with access to the device to create a backup, remove the legitimate app, install the malicious version,
NET Framework processes untrusted input, allowing an attacker to take control of an affected system by tricking victims into opening a specially crafted malicious document file sent over an email.
The flaw, tracked as CVE-2019-15260, is caused by insufficient access control for some URLs, which allows an attacker to gain access with elevated privileges to the device by requesting the unprotected URLs.
Facebook has disclosed a vulnerability in WhatsApp that allowed an attacker to take complete control over your smartphone by creating a special MP4 file and sending it to you.
devices you might have, but also allows an attacker to breach your network by cracking the more vulnerable WPA and TKIP protocols.
This vulnerability allows an attacker to execute commands as the client on bluehost.
mishandle the poisoned information, creating a vulnerability and thus allowing an attacker access at this vulnerable point.