Examples of using Which could be exploited in English and their translations into Swedish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
-
Political
The problem was a buffer overflow in the header parser which could be exploited.
There was an insecure syslog() call which could be exploited if the user could manage to insert text into the logged text.
in all places, which could be exploited.
The temporary file was not created safely, which could be exploited by an attacked to make nedit overwrite arbitrary files.
Mark Piper, Sven Herrmann and Brandon Knight discovered a cross-site scripting issue in the forum module, which could be exploited via the tid parameter.
LMH reported a potential local DoS which could be exploited by a malicious user with the privileges to mount
This implementation was found to contain an integer overflow vulnerability which could be exploited to execute arbitrary code.
This includes the identification of vulnerabilities which could be exploited to carry out an act of unlawful interference,
Timo Sirainen discovered a buffer overflow in the Cyrus IMAP server, which could be exploited by a remote attacker prior to logging in.
An anonymous researcher for TippingPoint and the Zero Day Initiative discovered an integer overflow triggered by the CSS letter-spacing property, which could be exploited to execute arbitrary code.
If a long password is supplied, this can cause a buffer overflow which could be exploited to execute arbitrary code with the privileges of the process which invokes PAM services.
Traceroute-nanog, an enhanced version of the common traceroute program, contains an integer overflow bug which could be exploited to execute arbitrary code.
a buffer is overflown, which could be exploited by an authenticated user to inject malicious code.
arbitrary code execution, which could be exploited through viewing malicious content.
MySQL, a popular relational database system, contains a buffer overflow condition which could be exploited by a user who has permission to execute"ALTER TABLE" commands on the tables in the"mysql" database.
Finally, some speakers felt that total or partial communitarisation of third pillar issues would entail a loss of powers for national governments and parliaments which could be exploited by extremist or populist parties.
Gopherd, a gopher server from the University of Minnesota, contains a number of buffer overflows which could be exploited by a remote attacker to execute arbitrary code with the privileges of the gopherd process(the"gopher" user by default).
a web-based IRC client, which could be exploited to execute arbitrary code.
The regular expression to detect AWK files contained two star operators, which could be exploited to cause excessive backtracking in the regex engine.
Cyrille Chatras discovered an information leak in PS/2 mouse and keyboard emulation which could be exploited during instance migration.
Kostantin Khorenko discovered an invalid error path in dev_queue_xmit() which could be exploited by a local user to cause data corruption.
Alan and Gareth discovered that the ia64 platform had an incorrectly declared die_if_kernel() function as"does never return" which could be exploited by a local attacker resulting in a kernel crash.
a multi-threaded download accelerator which could be exploited by a remote attacker to execute arbitrary code on the victim's machine.
a game, which could be exploited by a local attacker to gain gid"games".
Bas Wijnen discovered that the gnocatan server is vulnerable to several buffer overflows which could be exploited to execute arbitrary code on the server system.
This update resolves an unrestricted SWF file upload vulnerability(CVE-2018-4921), which could be exploited to conduct cross-site scripting attacks.
Olof Johansson discovered that the kernel does not disable the HID0 bit on PowerPC 970 processors which could be exploited by a local attacker to cause a denial of service.
Larry Cashdollar has discovered a potential buffer overflow in the htpasswd utility, which could be exploited when user-supplied is passed to the program via a CGI(or PHP, or ePerl,…) program.