Примеры использования Result in denial of service на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Processing a malformed file could result in denial of service.
These vulnerabilities might result in denial of service, leaking sensitive information from memory or, potentially, execution of arbitrary code.
Processing a malformed file could result in denial of service.
These vulnerabilities might result in denial of service or, potentially, execution of arbitrary code.
A NULL pointer dereference in SLIRP may result in denial of service.
Malformed RFC2047 header lines could result in denial of service or potentially the execution of arbitrary code.
Meder Kydyraliev discovered an infinite loop,which may result in denial of service.
Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed Real, MV, RL2, ASF, Apple HLS, Phantom Cine, MXF, NSV, MOV or RTP H.264 files/streams are processed.
Jan Beulich discovered that malformed device models could result in denial of service.
Victor Stinner discovered an integer overflow,which may result in denial of service or potentially the execution of arbitrary code.
Andrew Cooper discovered a vulnerability in the iret hypercall handler,which may result in denial of service.
Integer overflow in the ftp_genlist()function may result in denial of service or potentially the execution of arbitrary code.
It was discovered that a memory leak in parsing X.509 certificates may result in denial of service.
Incorrect memory management in the libgssapi_krb5 library might result in denial of service or the execution of arbitrary code.
Daniel Berrange discovered that the integrated VNC server insufficiently restricted memory allocation,which could result in denial of service.
Shi Lei discovered that excessively large OCSP status request may result in denial of service via memory exhaustion.
Stephen Gray andMatthew van Gundy discovered that incorrect handling of crypto NAK packets may result in denial of service.
Michal Zalewski discovered multiple vulnerabilities in SQLite,which may result in denial of service or the execution of arbitrary code.
Multiple vulnerabilities were discovered in the dissectors/parsers for ZigBee, GSM RLC/MAC, WaveAgent,ptvcursor, OpenFlow, WCCP and in internal functions which could result in denial of service.
Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation.
Eric Blake discovered an integer overflow in an internally used macro which could result in denial of service.
Jan Beulich discovered that an incorrect reference count overflow check in x86 shadow mode may result in denial of service or privilege escalation.
Multiple vulnerabilities have been discovered in Irssi,a terminal-based IRC client which can result in denial of service.
Jan Beulich discovered that an error in compatibility mode hypercall argument translation may result in denial of service.
Multiple vulnerabilities were discovered in the dissectors for Catapult DCT2000, IrDA,GSM Management, RLC ASN.1 BER, which could result in denial of service.
Pedro Ribeiro discovered a use-after-free in the handling of ImageText requests in the Xorg Xserver,which could result in denial of service or privilege escalation.
It was discovered that Wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for PCP, ADB, NBAP, UMTS MAC, IEEE 802.11, SIGCOMP, LDSS,GSM A DTAP and Q.931, which result in denial of service or the execution of arbitrary code.
This could lead to a remote crash, resulting in denial of service.
Various vulnerabilities have beendiscovered in the Tomcat Servlet and JSP engine, resulting in denial of service, cross-site scripting, information disclosure and WAR file traversal.
Multiple security issues havebeen discovered in Wordpress, a web blogging tool, resulting in denial of service or information disclosure.