Примеры использования Denial-of-service на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
It was a denial-of-service attack.
A local attacker could use this flaw for denial-of-service.
Denial-of-service attacks can be used as part of an extortion scheme.
This would allow unauthenticated users to cause a denial-of-service by crashing the daemon.
This could lead to denial-of-service(via application crash) or arbitrary code execution.
Люди также переводят
One common technique used to attack web-based services is denial-of-service(DoS) attacks.
Distributed denial-of-service(DDoS) is a type of attack in which multiple devices target a single device.
This could be used by a malicious remote user to intentionally crash the application,thus causing a denial-of-service.
These issues could lead to Denial-of-Service and, in some situation, the execution of arbitrary code.
Oleg Gorokhov of Yandex discovered that BIND does not properly handle certain queries when using DNS64 with the"break-dnssec yes;" option,allowing a remote attacker to cause a denial-of-service.
APC referred to distributed denial-of-service(DDoS) attacks, an often-used form of online protest.
An attacker could use this flaw by tricking a user into opening a maliciously crafted OpenType font file,thus causing a denial-of-service via application crash, or execution of arbitrary code.
Antonio Martin discovered a denial-of-service vulnerability in OpenSSL, an implementation of TLS and related protocols.
Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library,that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code.
An SCTP denial-of-service was discovered which can be triggered by a local attacker during a heartbeat timeout event after the 4-way handshake.
You must not attack our Site orLe VPN Service via a denial-of-service attack or a distributed denial-of service attack.
In addition, a denial-of-service was fixed, which could be triggered when a password containing 8-bit characters was used to log in CVE-2010-2813.
A user with access to sound devices could use this to cause a denial-of-service(crash or hang) or possibly for privilege escalation.
Several denial-of-service vulnerabilities were discovered in the dcraw code base, a program for procesing raw format images from digital cameras.
It was discovered that a local user permitted to create raw sockets could cause a denial-of-service by specifying an invalid protocol number for the socket.
An SCTP denial-of-service was discovered which can be triggered by a local attacker during a heartbeat timeout event after the 4-way handshake.
It was discovered that a local user permitted to create raw sockets could cause a denial-of-service by specifying an invalid protocol number for the socket.
In addition, denial-of-Service attacks, the taking over and vandalizing of a website, uploading Trojan horses, and sending out e-mail bombs(mass e-mailings) are also examples of Internet activism.
The introduction of EDNS made the DNS amplification attack feasible,a type of reflected denial-of-service attack, since EDNS facilitates very large response packets compared to relatively small request packets.
Brad Hill of iSEC Partners discovered that many XML implementations are vulnerable to external entity expansion issues, which can be used for various purposes such as firewall circumvention,disguising an IP address, and denial-of-service.
This can be used by a remote attacker for denial-of-service(hang) against applications that read from TCP sockets with splice.
It was discovered that weechat, a fast and light chat client, is prone to a buffer overflow vulnerability in the IRC plugin,allowing a remote attacker to cause a denial-of-service by sending a specially crafted filename via DCC.
This would allow an attacker to cause a crash by denial-of-service, or potentially execute arbitrary code, by tricking a user into processing a maliciously crafted assignments file.
Several vulnerabilities were discovered in libxslt, an XSLT processing runtime library,which could lead to information disclosure or denial-of-service(application crash) against an application using the libxslt library.
An attacker can take advantage of this flaw to cause an application crash(denial-of-service), or potentially to execute arbitrary code with the privileges of the user running MuPDF, if a specially crafted PDF file is processed.