Примеры использования Remote attacker can на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
A remote attacker can obtain sensitive information.
By supplying specially crafted packets a remote attacker can cause Tor to overflow its heap, crashing the process.
A remote attacker can take advantage of this flaw to mount a denial of service.
A remote attacker can take advantage of this flaw to cause suricata to crash.
A remote attacker can take advantage of this flaw to perform DNS rebinding attacks.
A remote attacker can use this flaw to cause a denial of service infinite loop.
A remote attacker can exploit this flaw to conduct cross-site scripting(XSS) attacks.
A remote attacker can exploit this flaw to access private files including sensitive data.
A remote attacker can take advantage of this flaw to cause a denial of service application crash.
A remote attacker can exploit this flaw to access system files via a directory traversal attack.
A remote attacker can take advantage of these flaws to cause an application using the librsvg library to crash.
A remote attacker can take advantage of this flaw to cause Irssi to crash, resulting in a denial of service.
A remote attacker can exploit this flaw to cause a denial of service against servers performing recursive queries.
A remote attacker can use this flaw to execute arbitrary code as root via a specially crafted URL.
A remote attacker can take advantage of this flaw to cause a denial-of-service against an application using the libgd2 library.
A remote attacker can take advantage of these flaws to perform cross-site scripting, header injection or denial of service attacks.
A remote attacker can take advantage of this flaw to discover private and sensitive information about another clients browsing session.
A remote attacker can exploit this flaw to crash any certificate verification operation and mount a denial of service attack.
A remote attacker can exploit this vulnerability to crash an application linked against libsrtp, resulting in a denial of service.
A remote attacker could use this flaw to cause denial-of-service conditions on the system.
A remote attacker could use this flaw to execute arbitrary code.
A remote attacker could exploit this attack to disable IPv6 connectivity.
A remote attacker could possibly use this issue to perform a data-smuggling attack.
A remote attacker could use this flaw to spoof WSGI headers.
A remote attacker could use this flaw to mount a denial of service attack.
A remote attacker could abuse this vulnerability for a denial of service.
A remote attacker could use this flaw to crash the system.
Remote attackers could examine files on the system running zoneminder.
Remote attackers could cause denial of service by disconnecting partway through making a request.
Remote attackers could perform a cross-site scripting attack by invoking Drupal.