Primjeri korištenja Remote attacker na Engleski i njihovi prijevodi na Hrvatskom
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
By sending a maliciously crafted PIM packet, a remote attacker may cause an unexpected system shutdown.
Impact: A remote attacker may be able to attack AFP servers through HTTP clients Description: An input validation issue was addressed with improved input validation.
Version 0.88 fixes the vulnerability which could allow a remote attacker to control a machine running clamantivirus.
Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary content.
Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch(3rd generation) and later,iOS 3.2 through 4.3.5 for iPad Impact: A remote attacker may cause a device reset Description: The kernel failed to promptly reclaim memory from incomplete TCP connections.
Available for: OS X Mountain Lion 10.8 andlater Impact: A remote attacker may be able to cause a denial-of-service Description: A resource exhaustion issue in glob() was addressed through an improved algorithm.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2,the most serious of which may allow a remote attacker to cause a denial of service Description: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2.
Backdoor- An application which communicates with remote attackers, allowing them to gain access to a system and to take control of it.
A security issue has been identified that could allow an authenticated remote attacker to compromise your system and gain control over it.
Available for: iPhone 4 and later, iPod touch(5th generation) and later, iPad 2 andlater Impact: A remote attacker may be able to cause the lock screen to become unresponsive Description: A state management issue existed in the lock screen.
A security issue has been identified that could allow an authenticated remote attacker to compromise your system and gain control over it.
Kernel Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 andlater Impact: A remote attacker may be able to bypass network filters Description: The system would treat some IPv6 packets from remote network interfaces as local packets.
Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation andlater Impact: A remote attacker may be able to leak memory Description: This issue was addressed with improved checks.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 andlater Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in DNS data parsing.