Примеры использования Be exploited на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Natural resources may be exploited.
This issue can only be exploited by authenticated administrators.
This is all information that can be exploited.
This can be exploited to inject and execute arbitrary PHP code.
I just couldn't stand by And watch you be exploited like that.
Люди также переводят
FREAK, however, can be exploited with a man-in-the-middle attack.
Of course, only a small part of the bugs can be exploited.
Our global experience can therefore be exploited for the customer's benefit.
This means they need to find a vulnerability that can be exploited.
This can be exploited to list contents of arbitrary directories.
Therefore, there is NOTHING that cannot be exploited….
But the Internet can also be exploited and abused by criminals.
Digitalization presents opportunities that should be exploited.
Energy coming from renewable sources can be exploited such as photovoltaic panels.
The Institute has been evolving until the concept today which will later be exploited.
This can only be exploited when running Links in graphical mode.
But the full potential of data can only be exploited at a cost.
These properties can be exploited as active sites in artificial enzymes.
Depending on the PHP application, this vulnerability could be exploited remotely.
Another technique that can be exploited by software is indirect branches.
Vulnerability Scanner- warns you of apps that could be exploited by hackers.
This vulnerability could be exploited by a remote client to cause a denial of service.
A miscalculation in_IO_wstr_overflow could potentially be exploited to overflow a buffer.
The advances made can be exploited with all France's Arabic-speaking partner countries.
Mothers' Union succeeded in educating her on her basic rights andwhy she must not be exploited.
Not only nuclear relaxation rates can be exploited to investigate physical properties.
The oceans contain a large amount of energy with different origins that can usefully be exploited.
The Council must not be exploited by some Powers in order to achieve their objectives.
A vulnerability in libutils, a generic library, can be exploited during audio file processing.
A buffer overflow can be exploited to crash the daemon, or potentially execute arbitrary code.