Examples of using Remote attackers in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Further on, remote attackers might be able to provide misleading information.
Keylogger-(keystroke logger)- A program which records each keystroke that a user types and sends the information to remote attackers.
Exploiting it allows remote attackers to run arbitrary code on vulnerable systems.
Several remote vulnerabilities have been discovered in centericq, a text-mode multi-protocol instant messenger client,which could allow remote attackers to execute arbitrary code due to insufficient bounds-testing.
Remote attackers can probably gain remote root access on affected systems.
People also translate
These vulnerabilities may allow remote attackers to execute arbitrary code.
Remote attackers can exploit this issue to run arbitrary code in the context of the affected application.
A vulnerability in OracleReal User Experience Insight allows remote attackers to inject arbitrary SQL on vulnerable systems.
Remote attackers can hang the Web Admin application in Darwin Streaming Server for Windows 2000/2003 Server.
Multiple buffer overflows in squidGuard allow remote attackers to bypass intended URL blocking or cause a denial of service.
It allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.
These vulnerabilities could be potentially exploited by remote attackers tricking an authenticated user to click on specially-crafted links.
Using special files, remote attackers might be able to access confidential data, to execute arbitrary commands or to trigger a Denial-of-Service.
Heap-based buffer overflow in CUPS, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations.
A cross-site scriptingvulnerability in the authentication page for webmin allows remote attackers to insert script into an error page and possibly steal cookies.
This makes it easier for remote attackers to obtain access via the TELNET, Windriver Debug, or FTP port.
Some vulnerabilities have beenfound that can be exploited by unauthenticated remote attackers to gain unauthorised access to confidential data as well as to provide misleading information.
The second problem allows remote attackers to cause a DoS via certain crafted requests and SSL timeouts.
Array index vulnerability in libmpdemux/demux_audio. c might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow applies to etch only.
Threats are not limited to remote attackers who attempt to access a system without permission from a remote location.
Dependent on the configuration, unauthenticated remote attackers might be able to conduct a Denial-of-Service or to access confidential data.
An error in command. php allows remote attackers to redirect users to arbitrary web sites via the forward parameter in a Log In action.
Marc Ruef discovered that Horde allows remote attackers to include web pages from other sites, which could be useful for phishing attacks.
A buffer overflow in LibTIFF allows remote attackers to execute arbitrary code or cause a Denial-of-Service via a crafted TIFF image with JPEG encoding.
This backdoor may then be used by remote attackers to publish and set up more malicious or potentially unwanted software application on the system.
They can be exploited by unauthenticated remote attackers to conduct a Denial-of-Service or to execute arbitrary code on vulnerable systems.
The Microsoft CHM file parser in ClamAV allows remote attackers to bypass malware detection using a crafted reset interval in the LZXC header of a CHM file.
Will Drewry discovered that Horde allows remote attackers to send an email with a crafted MIME attachment filename attribute to perform cross site scripting.
It was discovered that the Horde, allows remote attackers to send an email with a crafted MIME attachment filename attribute to perform cross site scripting.
