Примеры использования Unauthenticated на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
There are some situations in which unauthenticated access is useful.
Unauthenticated connections do not require a user name or password.
In this example,all clients connecting to your network are granted unauthenticated access.
Svn:// Unauthenticated TCP/IP access via custom protocol to a svnserve server.
B Because of distribution to two governorates of unauthenticated goods, the stock balance shows an artificial deficit.
An unauthenticated attacker can take advantage of this flaw to cause remote code execution.
For example, these files can be accessed via unauthenticated HTTP requests, and they can be used as a Personal Web Site.
An unauthenticated remote attacker may cause a krb4-enabled KDC to expose information.
Over 600 ElasticSearch servers have been reported compromised, andattackers have been continuously hacking unauthenticated systems online since then.
A remote unauthenticated attacker could leverage that to perform arbitrary code execution.
You can't select predefined user set All Users in shaping andquota rules because it means all users including unauthenticated.
This allows unauthenticated attackers to perform denial of service attacks by crashing the cups daemon.
Scan processes sent from scanners can be run on a scan server that is running in either authenticated mode or unauthenticated mode.
An unauthenticated remote attacker could exploit this flaw to execute arbitrary code with root privileges.
We have discovered that when Apple Watch Series 3 joins unauthenticated Wi-Fi networks without connectivity, it may at times prevent the watch from using cellular.
An unauthenticated attacker could use this flaw to cause an application using the xerces-c library to crash.
An incorrect length check inside the ASN.1 decoder of the MIT krb5 implementation allows an unauthenticated remote attacker to crash of the kinit or KDC program.
This may allow unauthenticated attackers to execute arbitrary SQL commands(SQL injection) and possibly escalate privileges.
Philip Martin discovered that HTTP-based Subversion servers crash when processing lock requests on repositories which support unauthenticated read access.
RRAS also supports unauthenticated access, which means that user credentials(a user name and password) are not required.
Vadim Melihow discovered that in proftpd-dfsg,an FTP server, the mod_copy module allowed unauthenticated users to copy files around on the server, and possibly to execute arbitrary code.
An unauthenticated remote attacker could take advantage of this flaw to execute arbitrary code as the web server user.
The Citrix Security Response Team discovered that corosync,a cluster engine implementation, allowed an unauthenticated user to cause a denial-of-service by application crash.
Jouko Pynnonen discovered an unauthenticated cross site scripting vulnerability(XSS) in wptexturize(), exploitable via comments or posts.
If you restart the scan server and then configure it to run in authenticated mode using the Scan Server Configuration Wizard,the scan server will continue processing unauthenticated scan processes until the scan queue is empty.
In unauthenticated mode, no certificate is used andthe scan server will accept unauthenticated scan processes from all scanners.
Forms authentication uses client-side redirection to forward unauthenticated users to an HTML form where they can enter their credentials, which are usually a user name and password.
An unauthenticated remote attacker could send a malformed network packet to a firebird server, which would cause the server to crash.
In the event that a scan server computer fails andthe scan server was running in unauthenticated mode and running scan processes from unauthenticated scanners, there will be pending scan processes for the scan server to run on restart.
An unauthenticated remote attacker may cause a krb4-enabled KDC to crash, expose information, or execute arbitrary code.