Примеры использования Could be exploited на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Depending on the PHP application, this vulnerability could be exploited remotely.
This vulnerability could be exploited by a remote client to cause a denial of service.
Vulnerability Scanner- warns you of apps that could be exploited by hackers.
This vulnerability could be exploited by an eavesdropper to decrypt and to intercept SSH sessions.
Any financial institution andany financial service could be exploited for money-laundering purposes.
This could be exploited by a remote attacker to cause arbitrary code to be executed on the user's machine.
A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex.
Mark Piper, Sven Herrmann andBrandon Knight discovered a cross-site scripting issue in the forum module, which could be exploited via the tid parameter.
A vulnerable application could be exploited for remote code execution, including executing arbitrary shell commands.
These initiatives also serve to address and prevent the creation of conditions that could be exploited by extremists.
The vulnerabilities of information systems could be exploited by many individuals, and it is not always easy to identify those individuals.
Cyrille Chatras discovered an information leak in PS/2 mouse and keyboard emulation which could be exploited during instance migration.
This could be exploited in environments where uploads of some files are externally blocked, but only by matching the trailing portion of the filename.
Mac OS X had an intentional local back door for 4 years, which could be exploited by attackers to gain root privileges.
This flaw could be exploited to carry out a denial of service attack against code that uses arbitrary user input as hash keys.
Many developing countries have substantial amounts of natural resources in rural areas which could be exploited for economic purposes.
Over an extended period of time,any vulnerability could be exploited by the host, who after all has all the resources of a State party.
The reserves of ore are also significant. There is 15.7 million tons of lignite coal in Kosmet, which could be exploited for the next two centuries.
A key existing partnership that could be exploited to this end is the Intergovernmental Working Group of Experts on International Standards of Accounting and Reporting ISAR.
They also pointed to the danger that the delay in the launching of the comprehensive peace process could be exploited by potential spoilers.
A number of complementary interventions could be exploited in addition to working through scientific societies including, for example, law enforcement outreach to scientists and insertion of relevant materials in core texts for science courses.
Calling a validator on a function actually written in some other language was not checked for and could be exploited for privilege-escalation purposes.
WFP distributed proportionally more food to its beneficiaries in 2013 butspent less on deliveries, particularly in large operations where economies of scale could be exploited.
By sending long data for the table name, a buffer is overflown, which could be exploited by an authenticated user to inject malicious code.
The Council expresses its concern at the creation of potential security vulnerabilities resulting from the increased instability in South Sudan that could be exploited by the LRA.
His delegation was concerned that a blanket constraint of that type could be exploited by the responsible State to the detriment of the injured State.
In vaccine development, knowledge gained through research on thepathogenicity of the disease agent and the host immune response could be exploited for harmful purposes;
While welcoming the initiatives, they observed that,if not properly harmonized, the situation could be exploited by the junta to reopen negotiations on issues already agreed upon.
The Board has repeatedly reminded the Governments of those States of their failure to comply with the relevant treaty obligations and of the imminent risk involved,as such a situation could be exploited by traffickers.
Nevertheless, the simultaneous application of different legal instruments may create loopholes that could be exploited by shipowners to circumvent the application of the Basel Convention.