| Naziv |
Replace Trusted Executable |
|---|---|
| Sažetak | An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called. |
| Preduvjeti | no |
| Rješenja | no |

