Examples of using Allow remote in English and their translations into Russian
{-}
-
Official
-
Colloquial
This could allow remote attackers to cause a denial of service.
Banks will start to use digital technologies that allow remote verification of the identity of costumers.
This could allow remote attackers to cause a denial of service crash.
Multiple buffer overflows andoff-by-one errors allow remote attackers to cause denial of service.
This could allow remote attackers to cause a denial of service crash.
It was discovered that several endianess errors may allow remote attackers to cause a denial of service.
This could allow remote attackers to cause a denial of service crash.
Heap-based buffer overflow in the nsWindow::OnExposeEvent function could allow remote attackers to execute arbitrary code.
This could allow remote users to cause a denial of service or privilege escalation.
Multiple cross-site scripting(XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML.
Allow remote administration of DHCP servers by configuring Windows Firewall ports.
Multiple cross site scripting issues allow remote attackers to inject arbitrary web script or HTML.
This could allow remote attackers to inject headers in emails and HTTP responses.
If you want to configure settings for the root account to access the SVM via SSH,select the Allow remote access via SSH for root account check box.
This could allow remote attackers to break out of the Lua sandbox and execute arbitrary code.
Several vulnerabilities were discovered in Asterisk, a PBX andtelephony toolkit, that allow remote attackers to perform denial of service attacks.
This could allow remote attackers to crash texttopdf or possibly execute arbitrary code.
Multiple cross-site scripting(XSS) vulnerabilities when JavaScript encoding is used, allow remote attackers to inject arbitrary web script or HTML.
This could allow remote attackers to execute arbitrary code via crafted 3GP files.
Multiple cross-site scripting(XSS) vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML.
This could allow remote clients to gain unrestricted access through a gateway proxy to its backend proxy.
Multiple SQL injection vulnerabilities in auth.php, which allow remote attackers to execute arbitrary SQL commands via the user and pass parameters.
This could allow remote attackers to disclose portion of private memory via crafted font files.
Unsafe use of Storable::thaw in the handling of comments to blog posts could allow remote attackers to include and execute arbitrary local Perl files or possibly remotely execute arbitrary code.
This could allow remote attackers to cause a denial of service(crash) or arbitrary code execution via crafted RTF files.
This could allow remote attackers to saturate the session store or cause other users' session records to be evicted.
This could allow remote attackers to cause a denial of service(crash) via crafted XPM files.
This could allow remote attackers to cause a denial of service(crash) or arbitrary code execution.
This could allow remote attackers to cause a denial of service(crash) or potentially execute arbitrary code.
This could allow remote attackers to perform a man-in-the-middle attack via crafted SSL certificates.