Examples of using Remote attackers in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Keylogger-(keystroke logger)- A program which records each keystroke that a user types and sends the information to remote attackers.
WordPress allows remote attackers to redirect authenticated users to other websites
A buffer overflow in LibTIFF allows remote attackers to execute arbitrary code
which could allow remote attackers to execute arbitrary code due to insufficient bounds-testing.
A cross-site scripting vulnerability in the authentication page for webmin allows remote attackers to insert script into an error page and possibly steal cookies.
Threats are not limited to remote attackers who attempt to access a system without permission from a remote location.
These vulnerabilities could be potentially exploited by remote attackers tricking an authenticated user to click on specially-crafted links.
The XML-RPC implementation, when registration is enabled, allows remote attackers to edit posts of other blog users.
It was discovered that rsync, a fast remote file copy program, contains an off-by-one error which might allow remote attackers to execute arbitrary code via long directory names.
This vulnerability could allow remote attackers to execute arbitrary code on installations of Lotus Quickr for Domino when the control is invoked as ActiveX by Microsoft Internet Explorer.
It allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.
These vulnerabilities may allow remote attackers to execute denial of service(Dos)
Multiple cross site scripting flaws allow remote attackers to inject arbitrary script or HTML fragments into several scripts.
It was discovered that several endianess errors may allow remote attackers to cause a denial of service.
SkypeCaphaw and the remote attackers manipulate you and control the computer.
Exploiting it allows remote attackers to run arbitrary code on vulnerable systems.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations.
Exploiting them might allow remote attackers a DoS on vulnerable systems.
Many vulnerabilities have been found that can be exploited by unauthenticated remote attackers.