Examples of using Arbitrary code in English and their translations into Russian
{-}
-
Official
-
Colloquial
This could lead to arbitrary code execution CVE-2008-5005.
Exploiting vulnerability also allows executing arbitrary code.
An attacker might remotely execute arbitrary code using a malicious phar archive.
Its successful use can make the browser execute arbitrary code.
However, they can be used to run arbitrary code in the receiving process' context.
People also translate
An attacker can exploit this flaw to execute arbitrary code.
An attacker could execute arbitrary code via a TeX file with long picture, circle, input tags.
A remote attacker could use this flaw to execute arbitrary code.
This enables an attacker to execute arbitrary code via a crafted ocsinventory-agent perl module placed on the system.
Apple has fixed the bug that allowed hackers to execute arbitrary code on the Wi-Fi chip.
Remote authenticated users could execute arbitrary code on the host running phpMyAdmin through manipulation of a script parameter.
Fix integer overflow which allowed remote attackers to execute arbitrary code.
Local users can cause adenial of service and possibly execute arbitrary code via a crafted paravirtualised guest kernel image.
This could allow remote attackers to break out of the Lua sandbox and execute arbitrary code.
Prevent remote attackers from executing arbitrary code via crafted RPM files.
This allows a local attacker to cause a denial of service orpotentially execute arbitrary code.
Static code injection allows for a remote attacker to inject arbitrary code into phpMyAdmin via the setup. php script.
These issues could lead to Denial-of-Service and, in some situation,the execution of arbitrary code.
This could allow remote attackers to execute arbitrary code via crafted 3GP files.
Attackers which impersonate the server could crash clients andpotentially execute arbitrary code.
A stack-based buffer overflow in the msTmpFile function might lead to arbitrary code execution under some conditions.
This could allow remote attackers to crash texttopdf or possibly execute arbitrary code.
Remote exploitation of an integer underflow vulnerability allows attackers to execute arbitrary code with the privileges of the logged-in user.
A buffer overflow can be exploited to crash the daemon, orpotentially execute arbitrary code.
An Off-by-one error have been discovered that allows remote attackers to execute arbitrary code or cause a denial of service.
This could allow remote attackers to cause a denial of service(crash) orpotentially execute arbitrary code.
Several vulnerabilities have been found in exim4 that allow a remote attacker to execute arbitrary code as root user.
This issue can be exploited by local users to achieve a Denial of Service(DoS) andpossibly execute arbitrary code.
A local user can use this flaw for denial of service orpossibly to execute arbitrary code.
Heap-based buffer overflow in the nsWindow::OnExposeEvent function could allow remote attackers to execute arbitrary code.