Obviously the attackers had already gained a winning advantage.
Her attacker apparently gained access to the house by cutting out a large portion of a second-story bedroom window screen.
An attacker who successfully exploited this vulnerability could gain the same user rights as the local user.
The attackers gained a foothold within the city but suffered heavy casualties, including John Nicholson.
Although the attackers gained their first objectives, they were held up short of the Chipilly spur, a steep wooded ridge.
Even if the attacker gained access to the jail's superuser account, he/she could only modify that jail, and not the whole system.
Successful exploits may allow attackers to gain privileged access to the device or network; other attacks may also be possible.
Once again, the attacker gains an unreasonable advantage.
Even if perfect cryptographic routines are used, the attacker can gain knowledge of the amount of traffic that was generated.
An attacker can gain important information by monitoring the frequency and timing of network packets.