Примеры использования Authenticated users на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
On this tab, we can check permissions for"Authenticated Users".
Authenticated users cannot access Network File System resources.
Exception is made for messages coming from authenticated users.
Authenticated users are identified by their SIDs in bandwidth usage logs.
If the Nobody option is selected,relaying is still possible for authenticated users.
Authenticated users can add arbitrary headers or content to mail generated by RT.
Multiple cross-site scripting(XSS)vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML.
Authenticated users could inject arbitrary web script or HTML via a crafted SQL query.
You might also see messages from all other authenticated users who happen to send messages to the channel at this time, until you unsubscribe.
Authenticated users could delete accounts using an obsolete interface which was incorrectly included in the package.
Tom Lane discovered that the implementation of the procedural language PL/Tcl insufficiently restricts the subset of allowed code,which allows authenticated users the execution of arbitrary Tcl code.
Authenticated users could inject arbitrary web script or HTML via a crafted file name in the Import function.
Tim Bunce discovered that the implementation of the procedural language PL/Perl insufficiently restricts the subset of allowed code,which allows authenticated users the execution of arbitrary Perl code.
The authenticated users can modify their own Account Signal Rules if they have a proper Account setting value.
Insufficient capabilities were required for uploading. html/. html files,making it easier for authenticated users to conduct cross-site scripting attacks(XSS) using crafted html file uploads.
Authenticated users could inject arbitrary web script or HTML via a crafted pageNumber value in Schema Export.
An SQL injection vulnerability was discovered in postfixadmin, a web administration interface for the Postfix Mail Transport Agent,which allowed authenticated users to make arbitrary manipulations to the database.
Remote authenticated users were allowed to obtain path information by reading the history of a node that has been moved from a hidden path.
For this purpose they should be allowed in generic Firewall Policy Rules as authenticated users, that is at Users tab you should specify something other than All Users, for example All Authenticated Users. .
The authenticated users can read and modify Signal Rules for other Accounts if they are granted Domain Administrator rights.
It was discovered that the foomatic-filters,a support package for setting up printers, allowed authenticated users to submit crafted print jobs which would execute shell commands on the print servers.
Authenticated users who can access the configuration module can obtain the encryption key, allowing them to escalate their privileges.
George Noseevich discovered that firebird2.5, a relational database system, did not properly check User-Defined Functions(UDF),thus allowing remote authenticated users to execute arbitrary code on the firebird server.
Remote authenticated users could execute arbitrary code on the host running phpMyAdmin through manipulation of a script parameter.
Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, andJava SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
Authenticated users can shut down the backend server by re-LOAD-ing libraries in$libdir/plugins, if any libraries are present there.
SETO(Secure Electronic Trade Opportunity)is expected to be a trade message system circulating between certified and authenticated users and would be standardized in a manner that guarantees the quality of the information contained.
This ensures that only authenticated users can submit DNS updates using a secure method, which helps prevent the IP addresses of trusted hosts from being hijacked by an attacker.
The last Set-ADObject cmdlet just ensures that even ifwellKnownObjects parameters will be restored to the default settings, authenticated users still wouldn't be able to join computers into the domain w/o pre-creating its accounts.
If GnuPG support is enabled, authenticated users can create arbitrary files as the web server user, which may enable arbitrary code execution.