Examples of using Vulnerable system in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
First, a vulnerable system was infected with Petya.
So the atacker can execute arbitrary code on the vulnerable system.
A local user account on the vulnerable system is not required in order to exploit telnet daemon.
Two vulnerabilities might allow unauthorized access to a vulnerable system.
Fortunately, a less vulnerable system of receiving time standards is available that is just as accurate and is based on atomic clock time-GPS.
So an attacker mightbe able to execute arbitrary commands on a vulnerable system.
This includes executing code that is already on a vulnerable system, searching and viewing files and exfiltrating sensitive data.
This can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
By submitting a specially crafted raster file, a remote attacker coulduse this vulnerability to trigger a buffer overflow, meaning a Denial-of-Service(DoS) against the vulnerable system. libgtk2-perl, a Perl interface to the 2.x series of the Gimp Toolkit library, incorrectly frees memory which GTK+ still holds onto and might access later, leading to DoS or, potentially, to arbitrary code execution.
Authenticated users might be able to modify or delete arbitrary files on a vulnerable system.
At this point it doesn't look to be actively exploited, it can at least crash IE,but at worst allow a vulnerable system to be controlled remotely….
The Oracle JInitiator ActiveX control contains multiple stack buffer overflows, whichcould allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
An attacker who successfully exploited this vulnerability couldgain elevated permissions on the namespace directory of a vulnerable system and gain elevated privileges.
Microsoft Internet Explorer 10 and propably also 9 with Adobe Flash installed contains a use-after-free vulnerability in the MSHTML CMarkup component, which can allow a remote,unauthenticated attacker to execute arbitrary code on a vulnerable system.
A string reference count bug was found in cupsd, causing premature freeing of string objects.This might lead to arbitrary code execution on a vulnerable system, caused by a malicious print job.
It contains an unspecified vulnerability that may allow aremote attacker to execute arbitrary code on a vulnerable system.
Besides Cross-Site Scripting(XSS), users with an existing account might be able to modify, create or delete arbitrary files on a vulnerable system.
A vulnerability in WideChapter Internet Browser for Windowscan result in the execution of arbitrary code on the vulnerable system.
APlunch ActiveX control contains methodsthat can allow a remote, unauthenticated attacker to run arbitrary commands on a vulnerable system.
A heap-based buffer overflow vulnerability in Mozilla mail code could potentiallyallow an attacker to run arbitrary code on a vulnerable system.
Due to several potential out-of-bounds index accesses, an remoteserver might be able to execute arbitrary code on a vulnerable system.
A vulnerability has been found in the way the Linux Kernel switches specific registers,so local users might be able to increase their privileges on a vulnerable system.
Panda ActiveScan fails to properly validate downloaded software, whichcan allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
This ActiveX control fails to restrict access to its methods, which can allow a remote,unauthenticated attacker to execute arbitrary commands on a vulnerable system.
A remote attacker who is able to sendmalicious DNS responses could potentially exploit this vulnerability to execute arbitrary code or cause a denial of service on a vulnerable system.
This flaw allows an attacker to send invalid content-type HTTP header as part of the file upload request whichcould result in execution of arbitrary code on the vulnerable system.
Some buffer overflows and other bugs were found in the openldap server and in theopenldap client libraries, so remote attackers might get access to a vulnerable system.
The GroupWise Client for Windows is vulnerable to multiple untrusted pointer dereference vulnerabilities,which could be exploited by a remote attacker to compromise a vulnerable system.
These devices are affected by the FreeBSD telnetd remote code execution, allowingremote and unauthenticated attackers to execute arbitrary code with elevated privileges on a vulnerable system.
Vulnerabilities in StarOffice/StarSuite 7, 8, and 9 have been found. The handling of Microsoft Word documents is not secure, so a remote attacker mightbe able to execute arbitrary code on a vulnerable system when a Word document is opened by a user.