Примеры использования Vulnerability allows на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
This vulnerability allows attackers to execute….
According to the researcher the exploitation of vulnerability allows the intruder to break the fundamental security functions of the Java Virtual Machine.
The vulnerability allows a remote user to cause a denial of service.
Files are stored under/tmp andhave predictable names, and the vulnerability allows a local attacker to overwrite arbitrary files the users has write permissions for.
IOS Vulnerability Allows Malicious Apps to Monitor User Touch Inputs.
An out-of-bounds access vulnerability allows local users to gain elevated privileges.
The vulnerability allows an attacker to reconstruct the private key by using the public key.
Cookie files are stored under/tmp andhave predictable names, and the vulnerability allows a local attacker to overwrite arbitrary files the users has write permissions for, and are also world-readable which may cause information leak.
This vulnerability allows attackers to execute code remotely and cause memory corruption.
An SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands.
This vulnerability allows an attacker to bypass TSIG authentication by sending crafted DNS packets to a server.
New OS X Vulnerability Allows Hackers Gain Root Access Without Password.
A new iOS vulnerability allows calls to premium rate numbers without users' consent.
Exploiting vulnerability allows obtaining information about existing users and groups in RFC server.
Aforementioned vulnerability allows the intruders to bypass security systems by using file of webarchive format.
Exploiting vulnerability allows executing arbitrary code or gain information about RFC server configuration.
This vulnerability allows remote attackers to cause a denial of service(crash) via a crafted image.
This vulnerability allows to display the archives management page, and download and delete the list archives by unauthorized users.
This vulnerability allows an attacker to cause Apache HTTPD to use an excessive amount of memory, causing a denial of service.
The vulnerability allows users to perform certain actions via HTTP requests without performing any validity checks to verify the request.
This vulnerability allows an attacker to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
The vulnerability allows a user with SELECT/FILE privileges to remotely or locally execute arbitrary code with root privileges.
The vulnerability allows to create arbitrary files on the user's system when Wget runs in recursive mode against a malicious FTP server.
The vulnerability allows man-in-the-middle attacks in situations where the server is using self-signed certificates and the connection is already established.
Vulnerability allowing man-in-the-middle attack on API call to GitHub.
Both vulnerabilities allow a third-party to intercept the encrypted communications of the user.
Over 60% of web services orAPIs designed for mobile applications contain at least one high-risk vulnerability allowing database compromise.
These vulnerabilities allow cyber attackers to hijack users' computers, smart TVs and phones, when the malicious subtitles are loaded while watching movies.
These vulnerabilities allow remote attackers to cause a denial of service, via resource consumption or application crash.
Such vulnerabilities allow hackers to obtain remote access to your computer and, therefore, to your data, your LAN resources and other sources of information.