Примеры использования Could exploit на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
And he found an asset he could exploit.
Local users could exploit this issue to achieve a Denial of Service DoS.
A flaw that our fugitives could exploit.
A local attacker could exploit this flaw to create an arbitrary file as the root user.
Isn't a lawless Nassau a weakness that Spain could exploit?
Люди также переводят
A remote attacker still could exploit this flaw to perform a denial of service attack.
In an effort to influence the status talks, extremist elements could exploit the tension for political gain.
An attacker could exploit these vulnerabilities to overwrite arbitrary files or disclose system information.
That made it clear that according to the Bible humanity could exploit the natural world as they wished.
An attacker could exploit this and launch a denial-of-service attack by simultaneously requesting many large files.
Thanks to insecure technology underpinning the internet,someone with the right credentials could exploit the Border Gateway Protocol….
An unauthenticated remote attacker could exploit this flaw to execute arbitrary code with root privileges.
I hope she stays far away because in my desire to reclaim this town, to steal from Marcel that which he holds most dear, I have realized one massive vulnerability,one weakness that Marcel could exploit.
A remote attacker could exploit this flaw to cause an application crash or potentially execute arbitrary code.
Furthermore, it identifies some of the key opportunities that African countries could exploit or capitalize upon in their development processes.
A remote attacker could exploit these vulnerabilities and call arbitrary functions by sending crafted HTTP requests.
The examples of Jemaah Islamiyah, Al-Qaida andthe Abu Sayyaf Group showed that terrorists could exploit any gap in legislation or law enforcement.
A unprivileged local user could exploit this flaw to crash the system kernel resulting in denial of service.
In May 2005, Japan decided to provide Afghanistan with grant aid(3 billion yen) for the purpose of constructing the new terminal of Kabul international airport,recognizing that terrorists could exploit less secured airport as their entrance to international transportation network.
But it is easy to see how terrorists could exploit such networks to acquire the means to pursue nuclear weapons.
A malicious user could exploit this flaw to log in as other users on the site, including administrators, and hijack their accounts.
The examination of national submissions to the Committee demonstrates, however,that many States believe non-State actors could exploit legitimate cross-border activities, particularly in free-trade zones or similar territories.
A remote attacker could exploit this flaw to cause the JasPer library to consume memory, resulting in a denial-of-service.
A local guest user with access to PIT i/o ports could exploit this flaw to cause a denial of service(crash) on the host.
A remote attacker could exploit this issue via a specially crafted DNS request to cause dnsmasq to crash, or potentially to obtain sensitive information from process memory.
In an effort to influence the status talks, some Kosovo Serbs and Belgrade could exploit every incident in an attempt to increase tension in order to portray a lack of security in Kosovo.
A remote attacker could exploit this flaw to cause an application using the JasPer library to crash, or potentially, to execute arbitrary code with the privileges of the user running the application.
A man-in-the-middle attacker could exploit this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client.
A remote attacker could exploit this flaw to cause CPU and memory exhaustion and the site's database to reach the maximum number of open connections, leading to the site becoming unavailable or unresponsive.
A man-in-the-middle attacker could exploit this flaw to skip the ServerKeyExchange message and remove the forward-secrecy property.