Exemple de utilizare a Could be exploited în Engleză și traducerile lor în Română
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
Someone thought they could be exploited.
This code could be exploited to open a security vulnerability on a forum running the affected version.
Nonetheless, the opportunities could be exploited more widely.
Mr. Drazen when Gaines hired me for this I told him there were a couple of defects in his plan that could be exploited.
These relations could be exploited to break into the cipher.
Well, to see if any of those powers could be exploited.
Otherwise, this ambiguity could be exploited to register only one of possibly many settlors or protectors.
But until then,any vulnerability against Lorenzo could be exploited.
Therefore, the regulatory gaps that could be exploited for ML/TF activities are addressed.
The end users were trained so that, after the completion of the implementation,all functionalities of the applications could be exploited to the benefit of the company.
These updates resolve vulnerabilities that could be exploited to circumvent the same-origin policy(CVE-2014-8453).
To prevent the spread of that information that could be exploited by adversary;
These signatures potentially could be exploited for early detection and subsequent mitigation of viral infections in algal ponds.
KB4011690- Patches vulnerabilities in Microsoft Office that could be exploited for remote code execution.
Whereas vulnerabilities in 5G networks could be exploited in order to compromise IT systems, potentially causing very serious damage to economies at European and national levels;
These updates resolve an out-of-bounds read vulnerability that could be exploited to leak memory addresses(CVE-2015-0307).
This is the kind of vulnerability that could be exploited by a worm that could give rise to a worm reminiscent of the Blaster Worm.
CVE-2018-8457 is a scripting engine memory corruption vulnerability in Edge and IE that could be exploited via a malicious website or Office file.
These updates resolve a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure(CVE-2015-6679).
To protecting all the potential security gaps which could be exploited by known and yet unknown threats.
These updates resolve validation bypass issues that could be exploited to write arbitrary data to the file system under user permissions(CVE-2015-3082, CVE-2015-3083, CVE-2015-3085).
These updates resolve a vulnerability(CVE-2015-3096) that could be exploited to bypass the fix for CVE-2014-5333.
These updates resolve validation bypass issues that could be exploited to perform privilege escalation from low to medium integrity level(CVE-2015-4446, CVE-2015-5090, CVE-2015-5106).
This update resolves a vulnerability in the implementation of Javascript APIs that could be exploited to execute arbitrary code(CVE-2014-0514).
If the data is sensitive, the recovered data could be exploited, causing damage much like the missed ember in a fire.
This now includes non-human operated computers(like IoT devices) that could be exploited as entry points to local networks.
These updates resolve a validation bypass issue that could be exploited to cause a denial-of-service condition on the affected system(CVE-2015-5091).
These updates resolve an information disclosure vulnerability that could be exploited to capture keystrokes on the affected system(CVE-2015-0302).
These updates resolve an integer underflow vulnerability that could be exploited to execute arbitrary code on the affected system(CVE-2014-0497).
This update resolves an important input validation bypass that could be exploited to read, write or delete data from the Campaign database(CVE-2017-2989).