Examples of using Unprivileged in English and their translations into Russian
{-}
-
Official
-
Colloquial
A remote code execution vulnerability in an Android runtime library could enable an attacker using a specially crafted payload to execute arbitrary code in the context of an unprivileged process.
A local unprivileged user could potentially use this flaw to leak kernel stack addresses
Philipp Reisner reported an issue in the connector subsystem which allows unprivileged users to send netlink packets.
Fabian Vogt discovered that incorrect permission handling in the PAM module of the KDE Wallet could allow an unprivileged local user to gain ownership of arbitrary files.
If unprivileged users are permitted to access this attribute,
An unprivileged guest user program may be able to elevate its privilege to that of the guest operating system.
RTP and RTCP typically use unprivileged UDP ports(1024 to 65535),
The terms privileged and unprivileged refer to the following security concepts for a UNIX or Linux computer.
Without isolated worlds, unprivileged pages could interfere with higher privileged scripts, and make them do whatever they want.”.
The various problems in the Extended BPF verifier can be mitigated by disabling use of Extended BPF by unprivileged users: sysctl kernel.
To circumvent this it is isolated in a separate, unprivileged virtual machine,
The default Debian configuration mitigated this as it does not allow unprivileged users to create new user namespaces.
If a local unprivileged user is authorized by sudoers file to run opcontrol as root, this user could
If the mobile operator or mobile device vendor has not restricted privileges on the mobile device and the Mobile2Market unprivileged certificate is trusted by the mobile device then the mobile device is assumed to be unlocked and available to be managed.
An unprivileged user within a guest system that has not enabled SYSENTER,
affected Palestinian and unprivileged Israeli farm producers alike.
separately the households of the unprivileged segments of the population.
allowing an unprivileged KVM guest user to crash the guest or potentially escalate their privileges.
ring 3 for unprivileged code nearly all user programs.
gain elevated privileges by accessing debugging features via the environment that would not normally be safe for unprivileged users.