Примеры использования Remote attacker could exploit на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
A remote attacker could exploit this attack to disable IPv6 connectivity.
Tidy did not properly process specific character sequences, and a remote attacker could exploit this flaw to cause a DoS, or probably, execute arbitrary code.
A remote attacker could exploit this vulnerability to execute script in a victim's Web browser within the security context of th.
An unauthenticated remote attacker could exploit this flaw to execute arbitrary code with root privileges.
A remote attacker could exploit this flaw to cause an application crash or potentially execute arbitrary code.
A remote attacker could exploit this flaw to perform a denial of service attack on the server and other hosted services.
A remote attacker could exploit these vulnerabilities and call arbitrary functions by sending crafted HTTP requests.
A remote attacker could exploit this flaw to cause the JasPer library to consume memory, resulting in a denial-of-service.
A remote attacker could exploit this flaw to cause a denial of service using a flood of UDP packets with invalid checksums.
A remote attacker could exploit this vulnerability to crash an application linked against libsrtp, resulting in a denial of service.
A remote attacker could exploit this flaw to cause a denial of service using a flood of UDP packets with invalid checksums.
A remote attacker could exploit this to run arbitrary code under the account of a user that receives a message from them using Claws Mail.
A remote attacker could exploit this flaw to cause an application using the JasPer library to crash, resulting in a denial-of-service.
A malicious remote attacker could exploit this flaw to mount a denial of service attack against a mumble client by causing the application to crash.
A remote attacker could exploit this flaw to mount a denial of service through memory exhaustion by repeatedly sending specially crafted DTLS records.
A remote attacker could exploit this issue via a specially crafted DNS request to cause dnsmasq to crash, or potentially to obtain sensitive information from process memory.
A remote attacker could exploit this flaw to cause an application using the JasPer library to crash, or potentially, to execute arbitrary code with the privileges of the user running the application.
A remote attacker could exploit this flaw to cause CPU and memory exhaustion and the site's database to reach the maximum number of open connections, leading to the site becoming unavailable or unresponsive.
A remote attacker could exploit this flaw using specially crafted certificates to mount a denial of service against an application linked against the library(application crash), or potentially, to execute arbitrary code.
A remote attacker could exploit this flaw using specially crafted certificates to mount a denial of service against an application linked against the library(application crash), or potentially, to execute arbitrary code.
A remote attacker can exploit this flaw to conduct cross-site scripting(XSS) attacks.
A remote attacker can exploit this flaw to access system files via a directory traversal attack.
A remote attacker can exploit this flaw to access private files including sensitive data.
A remote attacker can exploit this flaw to cause a denial of service against servers performing recursive queries.
A remote attacker can exploit this flaw to crash any certificate verification operation and mount a denial of service attack.
A remote attacker can exploit this vulnerability to crash an application linked against libsrtp, resulting in a denial of service.
A remote attacker can exploit this flaw to cause an application using the pixman library to crash, or potentially, to execute arbitrary code with the privileges of the user running the application.
A remote attacker can exploit this flaw to cause a denial of service(Samba crash), or potentially, to allow leakage of memory from the server in the form of a DNS TXT reply.
A remote attacker can exploit this flaw to cause a denial of service(daemon crash), or potentially, execution of arbitrary code, if bgpd is configured with BGP peers enabled for VPNv4.
A remote attacker can exploit this flaw by sending crafted messages to an application that is using libotr to perform denial of service attacks(application crash), or potentially, execute arbitrary code with the privileges of the user running the application.