英語 での Vulnerability may の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
The vulnerability may have existed for 20 years.
Remote attackers leveraging this vulnerability may be able to execute arbitrary code.
This vulnerability may affect multiple DNS server software. For more.
If the attacks needed to exploit a vulnerability are very difficult to carry out,then the vulnerability may be tolerable.
However, the BASH vulnerability may be even more serious than Heartbleed.
In Laravel 5.1 applications, the password reset notification is maintained by the developer,so this vulnerability may or may not be present.
Products Affected This vulnerability may affect multiple DNS server software.
This vulnerability may be exploited repeatedly resulting in an extended DOS attack.
A remote attacker sending aspecially crafted HTTP request leveraging the vulnerability may execute arbitrary code on the server that runs an application using Apache Struts 2.
The vulnerability may allow an attacker to modify the traffic content of an active RDP session.
A remote attacker sending aspecially crafted HTTP request leveraging the vulnerability may execute arbitrary code on the server that runs an application using Apache Struts 2.
This vulnerability may only be exploited if your application encryption key(APP_KEY environment variable) has been accessed by a malicious user.
A remote attacker sending aspecially crafted HTTP request leveraging the vulnerability may execute arbitrary code on the server that runs an application using Apache Struts 2 Struts application.
This vulnerability may only be exploited if your application encryption key(APP_KEY environment variable) has been accessed by a malicious user.
(Initial) An attacker leveraging the vulnerability may upload a file to a web-accessible directory avoiding restrictions on file upload.
This vulnerability may allow arbitrary code execution with privileges of the server application when a remote attacker sends a specially crafted request to WLS Security, a component of the Oracle WebLogic Server.
Biological vulnerability may play a role in developing binge-eating disorder.
The economy's biggest vulnerability may be the inflated stock market, which until recently was trading at record highs.
An attacker leveraging the vulnerability may upload a file to a web-accessible directory avoiding restrictions on file upload.
Exploitation of this vulnerability may cause the operating system or an application to become permanently unresponsive until it is restarted manually.
Successful exploitation of this vulnerability may result in the allocation of all available Phase 1 SAs, which may prevent new IPSec sessions from being established.
Successful exploitation of this vulnerability may result in the allocation of all available Phase 1 SAs, which may prevent new IPSec sessions from being established.
Successful exploitation of this vulnerability may result in the allocation of all available Phase 1 security associations(SA) and prevent the establishment of new IPsec sessions.
Vulnerabilities may be able to execute arbitrary code.
Of these vulnerabilities may be remotely exploitable without authentication.
These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a network without the need for a username and password.