Exemples d'utilisation de This vulnerability may en Anglais et leurs traductions en Français
{-}
-
Official
-
Colloquial
This vulnerability may have been intentional.
Successful exploitation of this vulnerability may allow an attacker with.
This vulnerability may result in a denial of service condition.
Successful exploitation of this vulnerability may result in information leakage.
This vulnerability may only be exploited if the attacker is on-link.
Successful exploitation of this vulnerability may result in information leakage.
This vulnerability may allow a local user to gain elevated privileges.
Exploitation of this vulnerability may lead to system compromise.
This vulnerability may shed through time, but it's always there in the back of your mind.
Exploitation of this vulnerability may allow disclosure of information.
This vulnerability may shed through time, but it's always there in the back of your mind.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
This vulnerability may allow malicious HTTP requests to bypass content filtering systems.
Exploitation of this vulnerability may lead to system compromise. Affected software.
This vulnerability may be related to the hormonal changes or hormone replacement therapy associated with menopause.8.
NSA said“This vulnerability may not seem flashy, but it is a critical issue.
This vulnerability may allow attackers to access to local files, depending on how the framework is used.
The exploitation of this vulnerability may cause various issues for the servers hosting BIND, as noted above.
This vulnerability may wrongly accept clients without checking their certificate chain under certain configurations.
Exploitation of this vulnerability may allow a remote attacker to execute arbitrary code on an affected system.