Primjeri korištenja Later impact na Engleski i njihovi prijevodi na Hrvatskom
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
iPod touch 6th generation and later Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description:
iPod touch 6th generation and later Impact: Processing maliciously crafted web content may exfiltrate data cross-origin Description:
iPod touch 6th generation and later Impact: Siri might reveal text message contents while the device is locked Description:
iPod touch 6th generation and later Impact: Processing a maliciously crafted web page may lead to universal cross site scripting Description:
iPod touch 6th generation and later Impact: Visiting a malicious website may lead to address bar spoofing Description:
iPod touch 6th generation and later Impact: A nearby user may be able to overhear spoken passwords Description:
iPod touch 6th generation and later Impact: A person with physical access to an iOS device may be able to access photos and contacts from the lock screen.
iPod touch 6th generation and later Impact: An application using CCrypt may disclose sensitive plaintext if the output
iPad 2 and later Impact: A local attacker may control the value of stack cookies Description: Multiple weaknesses existed
iPad 2 and later Impact: An application using NSXMLParser may be misused to disclose information Description:
iPad 2 and later Impact: Apps could bypass passcode-attempt restrictions Description: A privilege separation
iPad 2 and later Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description:
iPad 2 and later Impact: An untrusted MDM profile may be incorrectly displayed as verified Description:
iPad 2 and later Impact: Email attachments may be read without user's passcode Description:
iPad 2 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description:
iPad 2 and later Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description:
iPad 2 and later Impact: Visiting a malicious website may disclose image data from another website Description: A timing issue
iPad 2 and later Impact: Users recent Twitter activity could be disclosed on devices with no passcode.
iPad 2 and later Impact: Background applications could inject user interface events into the foreground app.
iPad 2 and later Impact: Sandboxed apps could send tweets without user interaction or permission.