Examples of using To execute arbitrary in English and their translations into Danish
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
a tool that automatically opens URLs in a user's preferred application, to execute arbitrary commands remotely.
a tool that automatically opens URLs in a user's preferred application, to execute arbitrary commands remotely.
A remote attacker providing a malicious module could use this issue to execute arbitrary code during signature verification.
A privileged guest user in a guest with the CDROM drive enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.
A remote attacker able to make an application call this function could use this flaw to execute arbitrary code with the permissions of the user running the application.
the mailx invocation used in that process allowed for any authenticated user able to submit jobs, to execute arbitrary code with the privileges of the condor user.
potentially allowing a remote attacker to execute arbitrary code.
Such connections allow the hackers to execute arbitrary commands to the compromised machines as well as deliver additional malware.
gives attacker ability to execute arbitrary code on behalf of the victim.
It allows them to execute arbitrary commands, as well as install additional modules to the targets at will.
direct hacker connection can be initiated which allows the criminals to execute arbitrary commands.
allowing an unauthenticated user to execute arbitrary code with root privileges.
These connections can also be used to execute arbitrary commands and also load additional malware.
CVE-2017-15400 Rory McNamara discovered that an attacker is able to execute arbitrary commands(with the privilege of the CUPS daemon)
The connection can also be used to execute arbitrary commands to the machines.
against the library(application crash), or potentially, to execute arbitrary code.
allowing a local user with privileges to modify a system connection to execute arbitrary commands as root.
or potentially to execute arbitrary code on the host with the privileges of the hosting QEMU process.
A privileged guest user in a guest with QEMU PIT emulation enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.
A privileged guest user in a guest with an AMD PCNet ethernet card enabled can potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.