Examples of using Exploited remotely in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Some of them can be exploited remotely, e. g.
They can be exploited remotely to carry out a Denial-of-Service attack.
This vulnerability could be exploited remotely.
They could be exploited remotely resulting in information disclosure.
Several buffer overflows were found in gtetrinet versions below 0.4.3 which can be exploited remotely.
The vulnerability could be exploited remotely to create a Denial-of-Service DoS.
The Flash Player update issued by Adobe is about to cover at least twenty-two flaws, and the update for Oracle's Javawill fix fifteen vulnerabilities that can be exploited remotely and without authentication.
They can be exploited remotely to conduct Denial-of-Service(DoS) attacks.
Multiple vulnerabilities have been discovered in arj, an open source versionof the arj archiver. They can be exploited remotely to modify arbitrary files, to execute arbitrary code, to access confidential data or to conduct a DoS.
They can be exploited remotely to access confidential data or to gain unauthorized access.
The vulnerability could be exploited remotely to execute arbitrary code.
These bugs can be exploited remotely via applications linked against libcurl.
This vulnerability could be exploited remotely to create a Denial of Service DoS.
The vulnerabilities could be exploited remotely resulting in disclosure of information or cross-site request forgery CSRF.
The vulnerabilities could be exploited remotely to create a Denial of Service DoS.
The vulnerability could be exploited remotely execute arbitrary code or to create a Denial-of-Service DoS.
This hole could theoretically be exploited remotely by sending messages with such headers.
The vulnerabilities could be exploited remotely to execute arbitrary code or to create a Denial-of-Service DoS.
The weaknesses in the SOAP functions of SiteScope can be exploited remotely to allow information disclosure or arbitrary code execution.
The vulnerability could be exploited remotely to install unauthorized printer firmware using port 9100 without authentification.
The vulnerability could be exploited remotely resulting in cross site scripting XSS.
These vulnerabilities could be exploited remotely to allow Cross-Site Scripting(XSS) and session fixation attacks.
The vulnerability could be exploited remotely to allow bypass of authentication.
This vulnerability could be exploited remotely to create a Denial of Service DoS.
The vulnerabilities could be exploited remotely affecting confidentiality, integrity and availability.
The vulnerabilities could be exploited remotely to execute arbitrary code or elevate privileges.
The vulnerabilities could be exploited remotely to create a Denial-of-Service(DoS) or execute arbitrary code.
These vulnerabilities can be exploited remotely, so the installation of the fixes is recommended.
These vulnerabilities could be exploited remotely by an unauthorized user to modify data, prompts, or responses.
The vulnerabilities could be exploited remotely to cross-site scripting(XSS) or to read information without authorization.