Examples of using Attacker can in English and their translations into Russian
{-}
-
Official
-
Colloquial
As a result, the attacker can bypass authentication.
Using this vulnerability, an attacker can listen to us.
Now an attacker can enumerate first letters.
Cross site scripting in table Print view when the attacker can create crafted table names.
An attacker can exploit this flaw for privilege escalation.
People also translate
Browsing to other sites using the Web pages in the MMC increases the risk that an attacker can gain control of the console computer and possibly the site.
An attacker can exploit this flaw to execute arbitrary code.
It is assumed that the attacker can observe all incoming and outgoing messages.
An attacker can use this flaw to bypass access restrictions for some commands and, e.g.
A remote authenticated attacker can use path traversal sequences e.g.
An attacker can exploit this by sending two consecutive SLP packets to a victim via MSN.
In certain configurations an attacker can take advantage of this flaw to gain root privileges.
An attacker can take advantage of this flaw to overwrite arbitrary files during archive extraction via a.
Emil Lenngren reported that an attacker can inject SQL commands when the synchronization between client and server is lost.
An attacker can exploit this flaw via several crafted NNTP commands to execute arbitrary code.
A server controlled by an attacker can send an invalid XML that can trigger an out-of-bound memory access.
An attacker can use this to compromise the mahara database via crafted user names.
As a result, an attacker can prematurely free an arbitrary string of global scope.
An attacker can exploit this flaw by connecting to a Gopher server that returns lines longer than 4096 bytes.
As a result, an attacker can trigger an assertion failure on servers under high query load that do DNSSEC validation.
An attacker can use this to execute arbitrary code on the system running memcached on etch with root privileges.
In previous versions of this web server, an attacker can receive the content of previously freed memory if an upstream server returned a specially crafted HTTP response, potentially exposing sensitive information.
An attacker can use this flaw to conduct reflected cross-site scripting attacks via various script parameters.
Using tools like TESO's Burneye, an attacker can alter an executable program to encrypt its true purpose, hiding it from firewall filters, intrusion detection systems, anti-virus software and the prying eyes of investigators.
If an attacker cannot disassemble or debug the program, he/she cannot know for sure if there is something interesting in the stack to be found.
An attacker can take advantage of this flaw to set the mode on an attacker-chosen file to a attacker-chosen value.
During this time, the attacker can issue a large number of fake diagnostic card on behalf of a respectable operator's inspection, and thereby hurt the owners, because their hands will get a fake.
An attacker could exploit these vulnerabilities to overwrite arbitrary files or disclose system information.
Attackers can manipulate those references to access other objects without authorization.
An attacker could lock a post that was being edited.