Exemples d'utilisation de Remotely exploitable en Anglais et leurs traductions en Français
{-}
-
Colloquial
-
Official
Which is likely remotely exploitable.
Remotely exploitable buffer overflows in bind.
These issues are remotely exploitable.
A remotely exploitable buffer overflow in gnuserv and xemacs.
This vulnerability is not remotely exploitable.
A remotely exploitable buffer overflow in stable's slrn.
This problem is potentially remotely exploitable.
Were remotely exploitable by hackers, and over 3% had exploitable vulnerabilities.
These vulnerabilities are all remotely exploitable.
More remotely exploitable buffer overflows in micq, mysql, and tinyproxy.
CVE-2006-5856 Assessment This vulnerability is remotely exploitable.
Several address remotely exploitable vulnerabilities.
Overall, 162 out of the 299 patched vulnerabilities are remotely exploitable.
The libpng“bug is remotely exploitable and can lead to.
Parser code in the crypto(3) library,all of them being potentially remotely exploitable.
This vulnerability is remotely exploitable without authentication.
A remotely exploitable buffer overflow in analog could be exploited via the CGI interface.
Of these vulnerabilities may be remotely exploitable without authentication.
Were remotely exploitable by hackers, and over 3% had exploitable vulnerabilities.
Researchers don't know yet if the flaw is remotely exploitable, he said.
Nov 27, 1998: There is a remotely exploitable problem in bootpd(8).(patch included.
For Oracle Database there are two security fixes one of which may be remotely exploitable without authentication.
This vulnerability is remotely exploitable and does not require any end user interaction.
Vulnerabilities are reported for“Oracle Sun Products Suite” and1 of them may be remotely exploitable without authentication.
These vulnerabilities are remotely exploitable and authentication may not be required.
Included in Java's 51 security fixes are patches to 50 vulnerabilities that are remotely exploitable without authentication.
Note that this is remotely exploitable when ClamAV is used as a mail gateway scanner.
A total of 19 of these vulnerabilities may be remotely exploitable without authentication.
Several remotely exploitable vulnerabilities have been discovered in the TYPO3 web content management framework.
Oracle has released a Security Alert that addresses three security vulnerabilities remotely exploitable without authentication.