Examples of using Arbitrary code in English and their translations into Croatian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Malicious mails can execute arbitrary code.
Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption vulnerability was addressed with improved locking.
Tiff file may lead to an unexpected application termination or arbitrary code execution Description.
Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management.
Tiff file may lead to an unexpected application termination or arbitrary code execution Description.
People also translate
The flaw enables malicious hackers to launch arbitrary code remotely, once a user clicks on a malicious Web site link or opens a malicious e-mail, Manzuik said.
Available for: Apple Watch Series 1 and later Impact:An application may be able to execute arbitrary code with kernel privileges.
This, in turn, allows the malware to execute the arbitrary code it needs and spread further, while defacing the host in the process.
IOSurface Available for: Apple TV 4K and Apple TV(4th generation) Impact:An application may be able to execute arbitrary code with kernel privileges.
Malicious mails can execute arbitrary code[27 Aug 1998] cfingerd.
I have not succeeded in making this code do anything more than cause a crash and eat up system resources, andI certainly haven't used it to take over anyone else's computer and execute arbitrary code.
Mp4 file may lead to arbitrary code execution.
Kernel Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel.
Impact: An attacker with a privileged network position may be able to execute arbitrary code Description: A frame validation and memory corruption issue existed for a given ethertype.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue existed in ImageIO.
Impact: An attacker with a privileged network position may be able to execute arbitrary code Description: Multiple buffer overflows existed in the handling of data during iCloud Keychain recovery.
Available for: iPhone 4 and later, iPod touch(5th generation) and later, iPad 2 and later Impact:A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in launchd.
Basically, the uninstaller will allow any web page to run arbitrary code and or remotely control your pc.
Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact:An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management.
Available for: iPhone 4 and later, iPod touch(5th generation) and later, iPad 2 and later Impact:A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in launchd.
Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact:Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory consumption issue was addressed with improved memory handling.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in IOAcceleratorFamily.
CFURL Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:Visiting a maliciously crafted website may lead to arbitrary code execution Description: An input validation issue existed within URL processing.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:Processing a maliciously crafted package may lead to arbitrary code execution Description: Multiple buffer overflows existed in the C standard library.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in handling syscalls.
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later Impact:A malicious application may be able to execute arbitrary code with root privileges Description: A race condition was addressed through improved memory handling.
IOHIDFamily Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:A malicious HID device may be able to cause arbitrary code execution Description: A memory corruption issue existed in an IOHIDFamily API.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:Opening a maliciously crafted iWork file may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of iWork files.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact:Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: A file traversal vulnerability existed in the handling of CPIO archives.