Examples of using Allow an attacker in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Such a backdoor could allow an attacker to stealthily copy,
These updates address vulnerabilities that could potentially allow an attacker to take over the affected system.
This could allow an attacker to create the directory and place dangerous symbolic links inside.
These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
This vulnerability may allow an attacker to forge a RSA signature,
Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services.
These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
It could allow an attacker to execute arbitrary script when a specially-crafted email message is forwarded or replied to.
This issue could potentially allow an attacker to inject code into a process that calls the vulnerable function.
These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
Vulnerabilities in unace allow an attacker to execute arbitrary code
These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
application to crash and could potentially allow an attacker to take control of the affected system.
Active Directory authentication that could allow an attacker to impersonate any LDAP-authenticated Console user.
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.