Examples of using Remote attacker in English and their translations into Russian
{-}
-
Official
-
Colloquial
This allowed a remote attacker to perform XML External Entity attacks,
A remote attacker can potentially take advantage of this flaw to cause disclosure of information from process memory.
This issue could enable a remote attacker to crash a Tor client,
A remote attacker can exploit this vulnerability to crash an application linked against libsrtp,
This could allow a remote attacker to cause a denial of service(crash) by querying a non-existent export.
A remote attacker could take advantage of this flaw to obtain potentially sensitive information from kernel memory.
This would allow a remote attacker to cause a denial-of-service by application crash, or potentially execute arbitrary code.
A remote attacker can use this flaw to execute arbitrary code as root via a specially crafted URL.
Several vulnerabilities have been found in exim4 that allow a remote attacker to execute arbitrary code as root user.
By submitting a specially crafted raster file, a remote attacker could use this vulnerability to trigger a buffer overflow.
An incorrect length check inside the ASN.1 decoder of the MIT krb5 implementation allows an unauthenticated remote attacker to crash of the kinit
A specially crafted Transformation could leak information which a remote attacker could use to perform cross site request forgeries.
MySQL over the web, performs insufficient input sanitising allowing a user assisted remote attacker to execute code on the webserver.
allowing a remote attacker to potentially spoof ECDSA signatures.
allowing a remote attacker to bypass intended access restrictions
This can be triggered by a local or remote attacker if a local UDP or raw socket has the IP_RETOPTS option enabled.
A remote attacker could exploit this vulnerability to execute script in a victim's Web browser within the security context of th.
The most severe of these issues is a critical security vulnerability in Framework that could allow a remote attacker using a specially crafted PNG file to execute arbitrary code within the context of a privileged process.
allowing a remote attacker to read significant parts of their content.
The most severe of these issues is a critical security vulnerability in the System component that could enable a remote attacker using a specially crafted PAC file to execute arbitrary code within the context of a privileged process.