Examples of using Remote attackers in English and their translations into Spanish
{-}
-
Colloquial
-
Official
Lock out remote attackers trying password guessing.
MFSA-2006-32 CVE-2006-3805 The Javascript engine might allow remote attackers to execute arbitrary code.
Jewdo will give remote attackers access and control over the machine.
MFSA-2006-50 CVE-2006-3807 Specially crafted Javascript allows remote attackers to execute arbitrary code.
SkypeCaphaw and the remote attackers manipulate you and control the computer.
Keep in mind that a computer infected with a backdoor Trojan can be used for various purposes, andthe threat can communicate with remote attackers.
Warbot will give remote attackers access and control of a victim's machine.
Backdoor. Bot. ED is a highly dangerous Trojan horse which runs as a backdoor program enabling remote attackers to gain access to the compromised system.
Building up a set of remote attackers and developing ways to mitigate those attacks.
Johann Dahm andDavid Richter reported an issue in the nfsd subsystem that may allow remote attackers to cause a denial of service via a buffer overflow.
JDT allows remote attackers to download additional malware onto a compromised PC.
An unspecified vulnerability allows remote attackers to cause a denial of service.
Remote attackers can use the IP address, as long as the client computer is connected.
Impact: This bugs can allow remote attackers to cause a denial of service.
Remote attackers can probably gain remote root access on systems without fixes.
Korgo will open ports that will give remote attackers unauthorized access to an infected PC.
A may allow remote attackers access to the information stored on your PC.
Multiple SQL injection vulnerabilities allows remote attackers to execute arbitrary SQL commands.
Aift will give remote attackers access to sensitive information stored on the system.
Eugene Teo reported an integer overflow in the DCCP subsystem that may allow remote attackers to cause a denial of service in the form of a kernel panic.
Joiner may give remote attackers access to an infected machine and download additional threats.
Multiple SQL injection vulnerabilities allow remote attackers to execute arbitrary SQL commands.
Curioso will give remote attackers access and control over the compromised machine.
Several vulnerabilities were discovered in wordpress, a web blogging tool,which could allow remote attackers to compromise a site via cross-site scripting, bypass restrictions or unsafe redirects.
Momibot.B will also give remote attackers access to confidential information stored on the computer.
PHP. ShellBot.N allows remote attackers access and control over compromised PCs.
BackDoor-DRV. gen.c allows remote attackers to download dangerous files onto a compromised PC.
Troj/Agent-MJM will also give remote attackers access and control over an infected computer.
The memory_limit functionality allows remote attackers to execute arbitrary code under certain circumstances.
If you do not want to be manipulated by remote attackers and have your computer infected, do not wait and remove the infection in question right now.
