Eksempler på bruk av Malicious application may på Engelsk og deres oversettelse til Norsk
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Impact: A malicious application may be able to execute unsigned code.
Apple TV HD Impact: A malicious application may be able to gain root privileges.
Available for: OS X El Capitan 10.11 Impact: A malicious application may be able to execute arbitrary code.
Available for: OS X El Capitan 10.11 Impact: A malicious application may be able to elevate privileges.
Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description:
Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A buffer overflow existed in IOHIDFamily.
Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description:
Impact: A malicious application may be able to execute arbitrary code with system privileges Description:
Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description:
Impact: A malicious application may be able to execute arbitrary code with system privileges Description:
later Impact: A malicious application may be able to determine kernel memory layout.
iPod touch 6th generation Impact: A malicious application may be able to learn information about the presence
later Impact: A malicious application may be able to leak sensitive user information Description:
later Impact: A malicious application may be able to access the iCloud user record of a previously signed in user.
later Impact: A malicious application may be able to restrict access to websites.
iPod touch 6th generation Impact: A malicious application may be able to initiate a Dictation request without user authorization Description:
later Impact: A malicious application may be able to leak sensitive user information Description:
later Impact: A malicious application may maintain access to Contacts after having access revoked Description:
Impact: A malicious application may be able to execute arbitrary code with system privileges Description:
Impact: A malicious application may be able to break out of its sandbox Description: A memory initialization