Examples of using To execute arbitrary code in English and their translations into French
{-}
-
Colloquial
-
Official
which allows remote attackers to execute arbitrary code or cause a denial of service(memory corruption
A buffer overflow vulnerability in subtitle handling allows an attacker to execute arbitrary code through the opening of a maliciously crafted MicroDVD,
Multiple integer overflows allow context-dependent attackers to execute arbitrary code via a crafted. dcm,. dib,. xbm,. xcf,
the ability to forge RX packets may be able to execute arbitrary code in kernel mode on an OpenAFS client, due to a vulnerability in XDR array decoding.
thus allowing remote authenticated users to execute arbitrary code on the firebird server.
or potentially, to execute arbitrary code with the privileges of the user running the application.
might allow an attacker, with control on the content of a ADF file, to execute arbitrary code with the privileges of the program execution.
An integer overflow leading to a heap-based buffer overflow when processing the Content-Length header of an HTTP request can be used by an attacker to execute arbitrary code via crafted POST requests containing negative Content-Length values.
or potentially to execute arbitrary code with the privileges of the user running the application.
which could allow remote attackers to execute arbitrary code.
it is possible to execute arbitrary code and disclose system information.
or potentially to execute arbitrary code.
or potentially to execute arbitrary code with the privileges of the user running the application.
or potentially, to execute arbitrary code with the privileges of the user running the application.
authenticated backend users could upload files that allowed to execute arbitrary code as the webserver user.
or potentially to execute arbitrary code.
Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
the request will actually cause the puppet master to execute arbitrary code.
Mads Olesen discovered a remote command injection vulnerability in the indexed search system extension which allows attackers to execute arbitrary code via a crafted file name which is passed unescaped to various system tools that extract file content for the indexing.