Примеры использования Remote attackers на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
This could allow remote attackers to cause a denial of service(crash) or arbitrary code execution.
Use-after-free vulnerability in the SVG implementation in Chromium before 27.0.1453.110 allows remote attackers to cause a denial of service
This could allow remote attackers to cause a denial of service(crash) via stack exhaustion,
that allow remote attackers to perform denial of service attacks.
This could allow remote attackers to disclose portion of private memory via crafted font files.
This could allow remote attackers to cause a denial of service(crash) via crafted certificates and CRLs.
This could allow remote attackers to cause a denial of service(crash) or potentially execute arbitrary code.
allowing remote attackers to execute arbitrary code via a specially crafted. flac file.
allowing remote attackers to execute arbitrary code via a specially crafted. flac file.
which allows remote attackers to cause a denial of service.
potentially allowing remote attackers to forge message digests.
which allows remote attackers to obtain unexpected results.
Unspecified vulnerability in Google Chrome before 9.0.597.84 allows user-assisted remote attackers to cause a denial of service(application crash) via vectors involving a bad volume setting.
Use-after-free vulnerability in Google Chrome before 9.0.597.84 allows remote attackers to cause a denial of service or possibly have unspecified
Use-after-free vulnerability in Chromium before 27.0.1453.110 allows remote attackers to cause a denial of service
Use-after-free vulnerability in the media loader in Chromium before 27.0.1453.93 allows remote attackers to cause a denial of service
Although it is a local privilege escalation, remote attackers can use it in conjunction with other exploits that allow remote execution of non-privileged code to achieve remote root access on a computer.
allows remote attackers to cause a denial of service
a library for graphic image formats, contained multiple integer underflows that could lead to a denial of service: remote attackers were able to trigger a crash by supplying a specially crafted image.
could allow remote attackers to cause a deadlock in the server process