Examples of using Arbitrary code in English and their translations into Japanese
{-}
- 
                        Colloquial
                    
 - 
                        Ecclesiastic
                    
 - 
                        Computer
                    
 - 
                        Programming
                    
 
When the user of this product views a webpage with malicious intent, this vulnerability causes an arbitrary code to be executed.
If these vulnerabilities(CVE-2020-8467, CVE-2020-8468) are exploited, an attacker may execute arbitrary code or alter components on the Apex One agent or Virus Buster Corporate Edition client.
Attackers able to tamper with the boot header in the early stages of the boot procedure can modify its contents to execute arbitrary code, thereby bypassing the security measures offered by the"encrypt only" mode.
By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service.
Once the file is opened, the code  could manipulate the program's memory allocation pattern and trigger the vulnerability to execute arbitrary code with the privileges of the user.
It did this by using a long string of the repeated character‘N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine.
This vulnerability could, under certain circumstances, allow a malicious user to execute arbitrary code on another user's system.
If Printer Sharing is enabled, a remote attacker may be able to cause arbitrary code execution with the privileges of the‘lp' user.
The vulnerability occurs when the ActiveX controls, while being used in Internet Explorer, corrupts the system state in such a way as to allow an attacker to execute arbitrary code.
Lambda Layers are a new type of artifact that can contain arbitrary code and data and may be referenced by zero, one, or more functions at the same time.
An attacker could then, in turn, exploit this vulnerability to cause the arbitrary code to run at a medium integrity level(permissions of the current user).
CWE-119(Buffer Errors) that may pose a serious threat like arbitrary code execution accounts for about 40 percent of the total.
Successful exploitation of the vulnerability on Cisco IOS may result in a reload of the device or execution of arbitrary code," Cisco said in its advisory.
This vulnerability is a type confusion vulnerability in IonMonkey JIT compiler. Remote attackers leveraging this vulnerability may be able to execute arbitrary code.
This vulnerability causes arbitrary code to be executed when the user of an affected system opens a maliciously crafted document file in web browsers or via e-mail using the Ichitaro series.
A Possible Attack Scenario Sending a specially crafted HTTP request to a Struts application with DMI enabled may result in arbitrary code execution on the server which runs the Struts application.
However, even if the target is the latest GLIBC, the OBOE against'struct malloc_chunk' still has another potential of arbitrary code execution.
On a device that has SKEYSEA Client View installed, a remote attacker may execute arbitrary code when the device is placed in a specific environment.
If this vulnerability is exploited, there is a possibility that arbitrary code may be executed on the computer that utilized the ActiveX control on a web browser.
Special elements in a path like the parent directory shortcut(…) and filename separators(/) can make the path a vector for remotely executing arbitrary code.