Examples of using Arbitrary code in English and their translations into Russian
{-}
-
Official
-
Colloquial
Remote exploitation of an integer underflow vulnerability allows attackers to execute arbitrary code with the privileges of the logged-in user.
A buffer overflow in parsing the printer setup information in ODF documents may result in the execution of arbitrary code.
potentially execute arbitrary code.
A buffer overflow and an integer overflow in parsing Microsoft Word documents may result in the execution of arbitrary code.
allowing remote attackers to execute arbitrary code via a specially crafted. flac file.
Cyrille Chatras discovered that an OOB memory write when using multiboot could result in the execution of arbitrary code.
allowing remote attackers to execute arbitrary code via a specially crafted. flac file.
resulting in the potential execution of arbitrary code.
potentially execute arbitrary code.
execute arbitrary code.
Florian Weimer discovered an integer overflow in parsing CPIO headers which might result in the execution of arbitrary code.
execute arbitrary code.
possibly execute arbitrary code.
A malicious server could use this to execute arbitrary code or perform denial of service.
A remote attacker could use a specially-crafted payload to execute arbitrary code on the puppet master.
This could be exploited by a remote attacker to cause arbitrary code to be executed on the user's machine.
this may result in arbitrary code execution when a victim is tricked into processing a malicious tex-file or this is done in an automated fashion.
An attacker can abuse this behaviour to execute arbitrary code via crafted localization files and triggering calls to_cupsLangprintf.
An attacker can use this to execute arbitrary code on the system running memcached on etch with root privileges.
An attacker could potentially use this crash to run arbitrary code on a victim's computer.