Примеры использования Potentially execute на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
This allows a local attacker to cause a denial of service or potentially execute arbitrary code.
These weaknesses allow an attacker to overflow heap buffers and potentially execute arbitrary code by supplying a maliciously crafted file of those types.
This would allow a remote attacker to cause a denial-of-service by application crash, or potentially execute arbitrary code.
This would allow an attacker to cause a crash by denial-of-service, or potentially execute arbitrary code, by tricking a user into processing a maliciously crafted assignments file.
A remote attacker can use this flaw to cause wpa_supplicant to crash,expose memory contents, and potentially execute arbitrary code.
Люди также переводят
This allows an attacker to crash applications using this functionality or potentially execute arbitrary code by tricking an application into verifying a signature created with a sufficiently long RSA key.
This could allow remote attackers to cause a denial of service(crash) or potentially execute arbitrary code.
Stefan Esser discovered that the implementation of the max_input_vars configuration variable in a recent PHP security update was flawed such that it allows remote attackers to crash PHP or potentially execute code.
An attacker can take advantage of this flaw to inject malicious escape sequences to the WEBrick log and potentially execute control characters on the victim's terminal emulator when reading logs.
A remote attacker can take advantage of this flaw by sending a specially crafted HTTP request to cause an application using the libsoup2.4library to crash(denial of service), or potentially execute arbitrary code.
This error could allow an attacker to crash an application making use of OpenSSL's libssl library, or potentially execute arbitrary code in the security context of the user running such an application.
An attacker could create a specially crafted LZO-compressed input that, when decompressed by an application using the lzo library,would cause that application to crash or, potentially, execute arbitrary code.
A buffer overflow can be exploited to crash the daemon, or potentially execute arbitrary code.
Tommi Rantala and Brad Spengler reported that the mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism,allowing a local attacker with access to/dev/mem to obtain sensitive information or potentially execute arbitrary code.
This would allow malicious users to crash the application or potentially execute arbitrary code.
Jan Beulich discovered that the QEMU Xen code does not properly restrict write access to the PCI config space for certain PCI pass-through devices, allowing a malicious guest to cause a denial of service,obtain sensitive information or potentially execute arbitrary code.
This issue allowed a remote user to crash the service, or potentially execute arbitrary code.
This resulted in a heap overflow,allowing a remote attacker to either cause a DoS via application crash, or potentially execute arbitrary code.
Attackers which impersonate the server could crash clients and potentially execute arbitrary code.
An attacker could, under some circumstances, use this flaw to cause a process that has the NSS orPAM module loaded to crash or potentially execute arbitrary code.
This could allow remote attackers to cause a denial of service(crash) or potentially execute arbitrary code.
An integer overflow leads toa heap-based buffer overflow, which allows an attacker to cause a denial of service(crash), or, potentially, execute arbitrary code.
This means that processes with such names, after being intercepted from the AllowIntercept processes,will be potentially executed on other(remote) IncrediBuild agents.
An attacker can exploit this flaw by sending crafted messages to an application that is using libotr to perform denial of service attacks or potentially execute arbitrary code.
A remote attacker could exploit this flaw to cause an application crash or potentially execute arbitrary code.
A remote attacker could leverage this flaw by sending maliciously crafted strings,thus causing an augeas-enabled application to crash or potentially execute arbitrary code.
A remote, unauthenticated attacker can take advantage of this flaw to crash the snmpd process(causing a denial of service) or, potentially, execute arbitrary code with the privileges of the user running snmpd.
A stack-based buffer overflow may allow attackers who can trick a user into mounting a crafted ISO 9660 file system to cause a denial of service(crash), or, potentially, execute arbitrary code.
This resulted in several heap-based buffer overflows,allowing a rogue server to either cause a DoS by crashing the client, or potentially execute arbitrary code on the client side.
It was discovered that bitlbee, an IRC to other chat networks gateway,contained issues that allowed a remote attacker to cause a denial of service(via application crash), or potentially execute arbitrary commands.