Примеры использования Remote attacker can на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Remote attackers could perform a cross-site scripting attack by invoking Drupal.
A remote attacker could use this flaw to mount a denial of service by sending crafted Range requests.
A remote attacker could exploit this flaw to cause an application crash
A remote attacker could send malicious requests to trigger this issue,
A remote attacker could exploit these vulnerabilities
A remote attacker could possibly use this issue to execute arbitary code by injecting commands via crafted URLs.
A remote attacker could exploit this flaw to cause the JasPer library to consume memory,
A remote attacker could take advantage of this flaw to obtain potentially sensitive information from kernel memory.
An unauthenticated remote attacker could take advantage of this flaw to execute arbitrary code as the web server user.
By submitting a specially crafted raster file, a remote attacker could use this vulnerability to trigger a buffer overflow.
A remote attacker could possibly use this flaw to mount a denial of service via resource consumption.
A remote attacker could use this flaw to mount a denial of service attack, by sending specially crafted Range requests.
A specially crafted Transformation could leak information which a remote attacker could use to perform cross site request forgeries.
A remote attacker could exploit this vulnerability to execute script in a victim's Web browser within the security context of th.
An unauthenticated remote attacker could exploit this flaw to execute arbitrary code with root privileges.
A non-authenticated remote attacker could mount a denial of service by submitting arbitrarily large passwords,
Remote attackers can bypass the cvsdb row_limit configuration setting, and consequently conduct resource-consumption
Remote attackers could use crafted requests to execute shell commands on the web server, using the snapshot generation
Remote attackers could cause a Denial of Service in the Service Location Protocol daemon(SLPD)
Pádraic Brady found that remote attackers could cause a denial of service by CPU consumption, via recursive or circular references through an XML entity expansion(XEE) attack.