Examples of using To arbitrary code execution in English and their translations into Russian
{-}
-
Official
-
Colloquial
This can lead to arbitrary code execution.
Crafted GIF files could cause ImageMagick to crash,potentially leading to arbitrary code execution.
This could lead to arbitrary code execution CVE-2008-5005.
It was discovered that OpenOffice. org would not properly process crafted document files,possibly leading to arbitrary code execution.
Roelli discovered that Emacs is vulnerable to arbitrary code execution when rendering text/enriched MIME data e.g.
A pre-authentication heap overflow involving oversized session resumption data may lead to arbitrary code execution.
An uninitialized memory issue, which could potentially lead to arbitrary code execution if the user were tricked into opening a malformed PDF document.
It was discovered that gifsicle, a tool for manipulating GIF image files,contained a flaw that could lead to arbitrary code execution.
Multiple invalid memory access issues, which could potentially lead to arbitrary code execution if the user were tricked into opening a malformed PDF document.
Tyson Smith, David Keeler, and Francis Gabriel discovered heap-based buffer overflows in the ASN.1 DER parser,potentially leading to arbitrary code execution.
A stack overflow, possibly leading to arbitrary code execution, exists in the processing of malformed XPointer expressions in the XML Signature Reference processing code. .
Exploitation of this issue may lead to arbitrary code execution.
This flaw could potentially lead to arbitrary code execution if a user or an automated system were tricked into processing a specially crafted Debian binary package(. deb) in the old style Debian binary package format.
A stack-based buffer overflow in the msTmpFile function might lead to arbitrary code execution under some conditions.
This issue can possibly lead to arbitrary code execution if a malicious device is plugged in, the system is configured to automatically mount it, and the mounting process chooses to run fsck on the device's malicious filesystem.
An attacker was able to craft a filename in comments that could lead to arbitrary code execution on the host running Smarty.
An attacker able to man-in-the-middle a HTTP request to an apt repository can trigger the buffer overflow,leading to a crash of the http apt method binary, or potentially to arbitrary code execution.
This issue can possibly lead to arbitrary code execution if a malicious device is plugged in, the system is configured to automatically mount it, and the mounting process chooses to run fsck on the device's malicious filesystem.
Several remote vulnerabilities have been discovered in python-zodb,a set of tools for using ZODB, that could lead to arbitrary code execution in the worst case.
It was discovered that PHP could perform an invalid free request when processing crafted XML documents, corrupting the heap andpotentially leading to arbitrary code execution.
Alvaro Munoz and Christian Schneider discovered that jython, an implementation of the Python language seamlessly integrated with Java,is prone to arbitrary code execution triggered when sending a serialized function to the deserializer.
It was discovered that Exim, Debian's default mail transfer agent, is vulnerable to commandinjection attacks in its DKIM processing code, leading to arbitrary code execution.
It was discovered that ChaSen, a Japanese morphological analysis system, contains a buffer overflow,potentially leading to arbitrary code execution in programs using the library.
An attacker able to man-in-the-middle HTTP requests to an apt repository that uses InRelease files(clearsigned Release files), can take advantage of this flaw to circumvent the signature of the InRelease file,leading to arbitrary code execution.
Several remote vulnerabilities have been discovered in the zope, a feature-rich web applicationserver written in python, that could lead to arbitrary code execution in the worst case.
In both cases the overflowing data is not completely attacker controlled but still leads to application crashes orunder some circumstances might still lead to arbitrary code execution.
Cisco Talos discovered that hdf5, a file format and library for storing scientific data,contained several vulnerabilities that could lead to arbitrary code execution when handling untrusted data.
Several vulnerabilities were discovered in the resolver in nginx, a small, powerful, scalable web/proxy server,leading to denial of service or, potentially, to arbitrary code execution.
An elevation of privilege vulnerability in sockets could enable a local malicious application to gain access to certain uncommon socket types possibly leading to arbitrary code execution within the context of the kernel.
On 64-bit platforms, file descriptor passing could be abused by local users to causeheap corruption in dbus-daemon, leading to a crash, or potentially to arbitrary code execution.