Examples of using Arbitrary code in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Vulnerability: arbitrary code execution.
Arbitrary code execution.
PROBLEMTYPE: Arbitrary Code Execution.
Arbitrary Code Executions.
This has allowed an attacker to run arbitrary code in some rare cases.
People also translate
Plone arbitrary code execution.
This may lead to information disclosure or arbitrary code execution.
MS IE arbitrary code execution.
These vulnerabilities by themselves do not allow arbitrary code to be run.
Remote arbitrary code execution.
The information disclosure vulnerability by itself does not allow arbitrary code execution.
Impact Arbitrary Code Execution.
This fixes many bugs andincludes the fix for a security vulnerability that allows an attacker to execute an arbitrary code.
Gaining Arbitrary Code Execution.
A specially crafted file could cause an application using JasPer to crash or, possibly,execute arbitrary code.
DoS or arbitrary code executions possible.
A buffer overflow in the function sql_prepare_where()allows attackers to remotely execute arbitrary code on the server.
Achieving Arbitrary Code Execution.
If a user with administrative privileges subsequently logs on to the system,the attacker could run arbitrary code in kernel mode.
An arbitrary code vulnerability in Library.
If this vulnerability is exploited, there is a risk that arbitrary code will be executed during the execution of the installer.
MFSA 2009-29 Arbitrary code execution using event listeners attached to an element whose owner document is null.
It used a long string repeating the character‘N' to overflow a buffer,which then allowed the worm to execute arbitrary code and infect the machine.
Code--- The arbitrary code for discriminating data is inputted.
SoftEther VPN Security Advisory articlesare published for high impact vulnerabilities(an arbitrary code execution or equivalent).
This may lead to arbitrary code execution and/or denial of service.
Multiple memory safety errors, missing permission checks andother implementation errors may lead to the execution of arbitrary code or cross-site scripting.
On the other hand, arbitrary code was not executed in the IE8 environment.
A man-in-the-middle attack while browsing the iTunes Store via iTunesmay lead to an unexpected application termination or arbitrary code execution.
This vulnerability allows an attacker to execute arbitrary code when an X Server reads in a specially crafted PCF font file.