Examples of using An attacker can in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
is a Mifare Classic card, an attacker can modify card amount, recharge, and so on.
An attacker could append malicious commands into a CGI(Common Gateway Interface) request, which would then be processed by a server.
That if exploited by an attacker, could easily bring down an entire website or web server.
With the keys, an attacker could easily break the encryption protecting Wi-Fi transmissions.
Researchers disclosed how an attacker could use Siri to bypass an iPhone's passcode to access native iOS apps like Clock and Event Calendar.
is too large or the service is not protected, an attacker could be granted access to the server with elevated privileges.
the researchers also indicated that an attacker could even include files from a remote SMB share using an HTML iFrame, which can be
Microsoft also warns that,“In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website, for example.
An attacker could use these apps to manipulate transit operators into taking dangerous actions, or even to directly influence SCADA systems,
The following is a non-exhaustive list of XSS attack vectors that an attacker could use to compromise the security of a website or web application through an XSS attack.
it is possible to get into a state where an attacker could overwrite a portion of the response with a string of 0xFFs even past the end of the heap buffer, resulting in a heap buffer overrun.
Microsoft said if the user is logged on with administrative rights, an attacker could use the vulnerability to effectively take control of the user's entire PC.
Per the Microsoft advisory,“In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website.”.
Theoretically, an attacker could perform a“cold boot attack,” quickly resetting your device and booting another operating
For example, an attacker could send a normal-looking PDF file attached to a plausible CV application email to organization's HR department that would bypass security checks;
As disclosed through an official Common Vulnerabilities and Exposures(CVE) report, an attacker could have actually used it to create new bitcoin- above the 21 million hard-cap of coin creation- thereby inflating the supply and devaluing current bitcoins.
because in such a situation an attacker could boot from an alternative source, like a live
Denial of Service(DoS) Flaw- An attacker could crash some daemons running in both D-Link 850L RevA and RevB remotely via LAN triggering DoS conditions.
In the past, researchers have also disclosed how an attacker could use Siri to bypass an iPhone's passcode to access native iOS apps like Clock and Event Calendar.