Examples of using Code with the privileges in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Then it's possible to execute code with the privileges of user'mail' at the qpop server.
A stack overflow vulnerability was found in socat that allows an attacker to execute arbitrary code with the privileges of the socat process.
This may lead to the execution of malicious code with the privileges of the user playing back Macromedia Flash content.
A stack-based buffer overflow vulnerability in the"libbecompat" library allows attackers to execute arbitrary code with the privileges of the Ingres user.
A local attacker can execute arbitrary code with the privileges of the user running the affected program.
By convincing a user to view a specially crafted HTML document,an attacker may be able to execute arbitrary code with the privileges of the user.
Local users could modify this script and run arbitrary code with the privileges of the user running Red Hat Management Console.
By convincing a user to view a specially crafted file containing a malicious thumbnail bitmap value,an attacker may be able to execute arbitrary code with the privileges of the user.
Two of them allow ahtuenticated users to execute arbitrary code with the privileges of the user running the database server.
A security vulnerability has been identified in the Xserver running on HP-UX. The vulnerability could beexploited by a local user to execute arbitrary code with the privileges of the Xserver.
A remote attacker could use this flaw to execute arbitrary code with the privileges of the user running system-config-printer.
A remote attacker can take advantage of this flaw tocause an application using the Expat library to crash, or potentially, to execute arbitrary code with the privileges of the user running the application.
A vulnerability in rpm allows an attacker to execute arbitrary code with the privileges of the lp user by sending a carefully crafted rpm package to the printing system.
A web page containing malicious content could possibly cause an application linked against XULRunner(such as Mozilla Firefox)to execute arbitrary code with the privileges of the user running the application.
Due to an input validation error,it is possible to execute arbitrary code with the privileges of the'wahttp' process by sending a malformed HTTP request.
A database user permitted to send database queries to a MongoDB server could use thisflaw to crash the server or, possibly, execute arbitrary code with the privileges of the mongodb user.
This vulnerability may allow an attacker to execute code with the privileges of the BIND server.
A remote attacker could provide a specially crafted XWD image file that, when processed, would cause the XWD plug-in to crash or, potentially,execute arbitrary code with the privileges of the user running the GIMP.
This bug can probably be used to execute arbitrary code with the privileges of the X server root.
An attacker who is able to control an IMAP or SMTP server accessed by the Balsa mail client can crashthe client or execute arbitrary code with the privileges of the user running it.
Due to multiple security vulnerabilities in the libgdk_pixbuf library, a remote unprivileged user may be able to execute arbitrary code with the privileges of a local user when that local user has loaded an XPixmap(Xpm) format image file supplied by an untrusted user.
A remote attacker could send pipelined HTTP requests that would causeHAProxy to crash or, potentially, execute arbitrary code with the privileges of the user running HAProxy.
A format stringvulnerability may permit an intruder to execute code with the privileges of the rwall daemon.
If a specially-crafted font file is loaded by an application linked against FreeType, it could cause the application to crash or, potentially,execute arbitrary code with the privileges of the user running the application.
A format string vulnerabilitymay permit a remote attacker to execute code with the privileges of the DHCPD typically root.
This vulnerability may allow alocal unprivileged user to execute arbitrary code with the privileges of the user running the file command.
A malicious local user couldexploit this issue to potentially execute arbitrary code with the privileges of the X. Org server.
A race condition in automake couldallow a local attacker to run arbitrary code with the privileges of the user running make distcheck.
In the worst case, these weaknesses permita remote, unauthenticated attacker to execute arbitrary code with the privileges of the user running vlc.
Cisco Secure Desktop contains a vulnerable ActiveX control thatcould allow an attacker to execute arbitrary code with the privileges of the user who is currently logged into the affected system.
