Examples of using Execution of arbitrary code in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Execution of arbitrary code with kernel privileges.
DSA-1448 eggdrop Fix execution of arbitrary code.
This allows the execution of arbitrary code with privileges of the"Oracle" user on Unix/Linux and"System" on Microsoft Windows.
DSA-1654 libxml2 Fix execution of arbitrary code.
Dirk Müller discovered an off-by-one buffer overflow in the Unicode handling, which might lead to the execution of arbitrary code.
Some of the exposed bugs might have been exploited for the execution of arbitrary code if they were not discovered in time.
It was discovered that an integer overflow in the decompression code for MEW archives may lead to the execution of arbitrary code.
A security risk in FreeType might lead to the execution of arbitrary code when a PDF document with maliciously crafted embedded fonts is opened.
This vulnerability could be exploited to allow execution of arbitrary code.
These vulnerabilities could allow remote execution of arbitrary code, disclosure of information, and other vulnerabilities.
It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code.
Du to this, increased privileges, Denial-of-Service or the execution of arbitrary code is possible.
Igor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the Javascript engine, which might allow the execution of arbitrary code.
The vulnerabilities could beexploited remotely resulting in unauthorized access, execution of arbitrary code, and Denial-of-Service DoS.
Justin Schuh, Tom Cross and PeterWilliams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the execution of arbitrary code.
Some vulnerabilities in tcpdump might allow remote Denial-of-Service,access to confidential data or the execution of arbitrary code on a vulnerable system.
Igor Bukanov, Eli Friedman, and Jesse Ruderman discovered crashes in the JavaScript engine, which might allow the execution of arbitrary code.
The vulnerabilities could be exploited remotely to cause a Denial-of-Service(DoS), cross-site scripting(XSS), execution of arbitrary code, or cross-site request forgery CSRF.
Jesse Ruderman, Kai Engert, Martijn Wargers, MatsPalmgren and Paul Nickerson discovered crashes in the layout engine, which might allow the execution of arbitrary code.
Multiple vulnerabilities have been discovered in the JasPer library for processing JPEG-2000 images,which may result in Denial-of-Service or the execution of arbitrary code if a malformed image is processed.
Devon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code.
Additionally, an integer error might trigger a buffer overflow and hence allow the execution of arbitrary code.
If they used to process data from untrusted sources,it could lead to denial of service or execution of arbitrary code.
Several local vulnerabilities have been discovered in freetype, a FreeType 2 font engine, which could allow the execution of arbitrary code.
Wei Wang discovered that the free of an uninitialised pointer in the Kerberos RPC library may lead to the execution of arbitrary code.
Several vulnerabilities have been discovered in the interpreter for the Ruby language,which may lead to denial of service or the execution of arbitrary code.
Tom Ferris, Seth Spitzer, Martin Wargers, JohnDaggett and Mats Palmgren discovered crashes in the layout engine, which might allow the execution of arbitrary code.
Multiple security vulnerabilities has been identified and fixed in libmodplug.They might lead to buffer overflows and thus to Denial-of-Service(DoS) or the execution of arbitrary code.
David Bloom discovered a race condition in the image handling of designMode elements,which can lead to information disclosure and potentially the execution of arbitrary code.
The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial-of-Service(DoS),and execution of arbitrary code.