Examples of using Vulnerability can be exploited in English and their translations into French
{-}
-
Colloquial
-
Official
Vulnerability can be exploited.
In some occasions a vulnerability can be exploited.
This vulnerability can be exploited in phishing attacks.
Access Vector(AV): This how a vulnerability can be exploited.
This vulnerability can be exploited remotely.
The Exploitability metrics reflect the ease andtechnical means by which the vulnerability can be exploited.
How the vulnerability can be exploited and the potential impact.
Vulnerability can be exploited to gain access to sensitive information and under certain circumstances to execute arbitrary code and totally compromise the vulnerable server.
For TLS, this vulnerability can be exploited after Logjam(VIGILANCE-VUL-16950.
The vulnerability can be exploited via the use of a malicious site.
This vulnerability can be exploited remotely via unknown vectors.
This vulnerability can be exploited remotely via unknown vectors.
This vulnerability can be exploited remotely via unknown vectors.
This vulnerability can be exploited remotely via a specially designed website.
This vulnerability can be exploited remotely via a specially designed website.
This vulnerability can be exploited remotely via a specially designed TLS traffic.
This vulnerability can be exploited by merely modifying the FLV file's audio tag.
The vulnerability can be exploited by an incoming message in the MXit protocol plugin.
This vulnerability can be exploited remotely via a specially designed authentication request.
The vulnerability can be exploited remotely and does not require a high level of skill.
This vulnerability can be exploited via specially crafted file to execute arbitrary code.
This vulnerability can be exploited to then cause remote code execution on the device.
This vulnerability can be exploited via specially crafted file to execute arbitrary code.
This vulnerability can be exploited from the network at a point related to MSXML via a specially designed website.
This vulnerability can be exploited as long as the phones are connected to their carrier networks.
This vulnerability can be exploited locally through a malicious USB drive, or remotely via network shares and WebDAV.
This vulnerability can be exploited by a local user to crash system services that use libdbus, causing denial of service.
This vulnerability can be exploited using spoofed packets but may also be triggered by normal network traffic.
This vulnerability could be exploited in cross-site scripting attacks.
Many of the vulnerabilities can be exploited remotely without authentication.