英語 での A remote attacker の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
A remote attacker may be able to bypass access restrictions.
When this vulnerability is exploited, a remote attacker may.
A remote attacker may conduct unauthorized DNS dynamic update.
When this vulnerability is exploited, a remote attacker may.
A remote attacker may exploit this issue to deny service for legitimate users.
When these vulnerabilities are exploited, a remote attacker may execute.
Impact: A remote attacker may be able to attack AFP servers through HTTP clients.
The update resolves multiple memory corruption issues in CoreGraphics, ImageIO, and libxml2,which could allow a remote attacker to execute arbitrary code.
Software. As a result, a remote attacker may terminate Adobe Reader.
A remote attacker could read or modify the contents in the system under certain circumstances.
On a device that has SKEYSEA Client View installed, a remote attacker may execute arbitrary code when the device is placed in a specific environment.
A remote attacker can inject arbitrary text into public-facing pages via the comments box.
MERGED Four separate security flaws in OpenSSL,which could allow a remote attacker to crash an OpenSSL-using application or to execute arbitrary code with the privileges of the application, have been fixed.
A remote attacker may execute arbitrary code by convincinga user to open contents leveraging the vulnerability.
The most severe of these issues is a critical securityvulnerability in the Framework component that could enable a remote attacker using a specially crafted message to causea permanent denial of service.
If Printer Sharing is enabled, a remote attacker may be able to cause arbitrary code execution with the privileges of the‘lp' user.
A remote attacker may execute arbitrary code by convincinga user to open contents leveraging the vulnerability.
According to the US Cert Alert(TA14-098A) that was documented on April 8, 2014,this vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling in the heartbeat extension.
A remote attacker sending a specially crafted HTTP request leveraging the vulnerability may execute arbitrary code on the server that runs an application using Apache Struts 2.
Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary content.
A remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process.".
When this vulnerability is exploited, a remote attacker may conduct unauthorized DNS dynamic update(CVE-2017-3143) and zone transfer CVE-2017-3142.
A remote attacker sending a specially crafted HTTP request leveraging the vulnerability may execute arbitrary code on the server that runs an application using Apache Struts 2.
When these vulnerabilities are exploited, a remote attacker may terminate named, etc by causing named's memory use to grow without bounds until all memory available to the process is exhausted.
A remote attacker sending a specially crafted HTTP request leveraging the vulnerability may execute arbitrary code on the server that runs an application using Apache Struts 2 Struts application.
CVE-2019-1653 requires no authentication, so a remote attacker can easily retrieve sensitive information including the router's configuration file, which includes MD5 hashed credentials as well as diagnostic information.
As a result, a remote attacker may terminate Adobe Reader and Acrobat, or execute arbitrary code by convincing a user to open contents leveraging the vulnerabilities.
Due to a buffer overflow in header parsing in sendmail, a remote attacker can create a specially-crafted message that may cause sendmail(8) to execute arbitrary code with the privileges of the user running it, typically root.
As a result, a remote attacker may terminate Adobe Reader and Acrobat, or execute arbitrary code by convincing a user to open contents leveraging the vulnerabilities.