Examples of using Remote attacker in English and their translations into Spanish
{-}
-
Colloquial
-
Official
Multiple SQL injection vulnerabilities allow remote attackers to execute arbitrary SQL commands.
MFSA-2006-32 CVE-2006-3805 The Javascript engine might allow remote attackers to execute arbitrary code.
An unspecified vulnerability allows remote attackers to cause a denial of service.
Impact: This bugs can allow remote attackers to cause a denial of service.
Momibot.B will also give remote attackers access to confidential information stored on the computer.
Backdoor. Bot. ED is a highly dangerous Trojan horse which runs as a backdoor program enabling remote attackers to gain access to the compromised system.
Joiner may give remote attackers access to an infected machine
The memory_limit functionality allows remote attackers to execute arbitrary code under certain circumstances.
Remote attackers can use the IP address,
If you do not want to be manipulated by remote attackers and have your computer infected,
Korgo will open ports that will give remote attackers unauthorized access to an infected PC.
the threat can communicate with remote attackers.
which could allow remote attackers to compromise a site via cross-site scripting,
By exploiting an integer overflow in the SCTP_AUTH_KEY handling code, remote attackers may be able to cause a denial of service in the form of a kernel panic.
They allowed remote attackers to perform SQL injections
Impact: A remote attacker may obtain sensitive information.
Usually the actions performed by a remote attacker via Rootkit.
Its function is help remote attacker access the compromised computer.
Impact: A remote attacker may be able to leak memory.
Impact: A remote attacker may cause an unexpected application termination.