Examples of using Privileged data in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Remote Denial-of-Service or access to privileged data.
Access to privileged data or Cross-Site Scripting attacks.
Authenticated attackers might be able to access privileged data.
Access to privileged data might be possible as Denial-of-Service also is.
If not fixed, a local user might access privileged data.
Access to privileged data, remote code execution or Denial-of-Service.
Authenticated users might exploit them to access privileged data.
Cross-Site Scripting, access to privileged data or Denial-of-Service.
Besides this, local users might be able to access arbitrary code andaccess privileged data.
This might allow access to privileged data for remote and unauthenticated attackers.
They can be exploited to providemisleading information and to access privileged data.
This may allow an attacker toaccess privileged data, or delete and modify arbitrary files.
Exploiting them might allow remote Denial-of-Service(DoS)or remote access to privileged data.
Exploiting them might allow authenticated attackers to access privileged data or to compromist the administrative account.
Unauthenticated attackers might beable to provide misleading information and to access privileged data.
They might allow users with an existing account to access privileged data or to increase their privileges. .
As a consequence, misleading information might be provided andremote attackers might be able to access privileged data.
If you use persistentconnections, your application could access invalid or privileged data that were created in a previous PHP request.
FortiAuthenticator shows multiple vulnerabilities whichmicht allow Cross-Site Scripting or access to privileged data.
Exploiting these vulnerabilities might allow local users to access privileged data, to execute arbitrary code or to conduct a Denial-of-Service DoS.
These vulnerabilities may allow an attacker to create a denial of service(DoS)or access privileged data.
It contains several vulnerabilities thatmight allow remote attackers to access privileged data, to provide misleading information as well as Denial-of-Service.
It is possible to create a user defined in the Oracle9i database server withlimited privileges who can potentially access privileged data using SQL syntax for outer joins.
Some vulnerabilities have been found, allowing unauthenticated remote atteackers to access privileged data, to execute arbitrary code as well as to conduct a Denial-of-Service.
Due to buffer overflows, remote attackers might be able to executearbitrary commands, access privileged data or to conduct a Denial-of-Service.
Exploiting these vulnerabilities might lead to a local root compormise orthe possibility to access privileged data and to overwrite arbitrary files.
Several issues have been discovered in the MySQLdatabase server. Users with an existing account might be able to access privileged data and to conduct a Denial-of-Service DoS.
These vulnerabilities may allow remote attackers to execute denial of service(Dos) attacks, execute arbitrary code,access privileged data or may allow cross-site-scripting(XSS) attacks.
Two vulnerabilities have been found in XEN that could allow attackers with an existingaccount to conduct a Denial-of-Service, to access privileged data as well as to compromise the root account.