Examples of using Arbitrary files in English and their translations into Swedish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
-
Political
Thus, it is possible to read arbitrary files.
This could lead to arbitrary files to get overwritten.
Rb allows remote attackers to read arbitrary files.
This bug could potentially be exploited to overwrite arbitrary files with the privileges of the user running mindi.
Impact: An Apple-signed binary could be used to load arbitrary files.
This bug could potentially be exploited to overwrite arbitrary files with the privileges of the user running Emacs and skk.
Raw directive, allowing remote attackers to include arbitrary files.
Specifically, this allows an attacker to read or write arbitrary files as root which can be used to elevate privileges.
Okular files(annotated document archives), which could result in the creation of arbitrary files.
This may be exploited to overwrite arbitrary files on the local system.
A remote, authenticated attacker could use these flaws to write and/or delete arbitrary files.
A local attacker could exploit this vulnerability to overwrite arbitrary files with the privileges of the user running sup.
It doesn't represent a real source package format but can be used to create source packages with arbitrary files.
Thus, it is possible to read arbitrary files.
We have received a report that using ncurses in setuid programs will give the user a way to open arbitrary files.
An attacker could exploit these vulnerabilities to overwrite arbitrary files or disclose system information.
which could be exploited by an attacked to make nedit overwrite arbitrary files.
because it created arbitrary files that are hard to find.
Glibc checks for characters like'/' in the LANG and LC_* environment variables to see if someone is trying to trick a program into reading arbitrary files.
The script mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack.
allowing a local attacker to trick samba into overwriting arbitrary files.
In some configurations, this allows for appending data to arbitrary files as root.
standard symlink attacks can be used to make tcsh overwrite arbitrary files.
IDEFENSE identified a vulnerability in the Opera web browser that could be used by remote attackers to create or truncate arbitrary files on the victims machine.
The Apache group has released another security bugfix which fixes a vulnerability in mod_rewrite which may result the remote attacker to access arbitrary files on the web server.
Arbitrary file deletion.
An attacker can exploit this vulnerability and overwrite an arbitrary file in the system.
DSA-600-1 samba-- arbitrary file access.
clickjacking or arbitrary file execution.
and thus be be tricked into running that arbitrary file as the invoking user.