Examples of using Remotely exploited in English and their translations into German
{-}
-
Official
-
Colloquial
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
These vulnerabilities may be locally or remotely exploited.
The vulnerability could be remotely exploited to create a Denial-of-Service DoS.
A potential security vulnerability has been identified with the HP StoreVirtual Storage.This vulnerability could be remotely exploited to gain unauthorized access to the device.
The vulnerability can be remotely exploited to incorrectly validate a user.
It could be remotely exploited resulting in disclosure of sensitive information or execution of arbitrary code with root privileges.
Critical vulnerabilities are considered remotely exploited or with little(or no) user interaction.
The vulnerabilities could be remotely exploited resulting in Denial-of-Service(DoS), unauthorized disclosure of information, and unauthorized modification.
This vulnerability could be remotely exploited to create a Denial-of-Service DoS.
The vulnerability can be remotely exploited to write arbitrary files to the system and execute them via the browser.
This vulnerability could be remotely exploited to execute arbitrary code.
These vulnerabilities could be remotely exploited by users having an account to allow an increase of privilege, create a Denial-of-Service(DoS), or execute arbitrary code.
The vulnerability could be remotely exploited resulting in a Denial-of-Service DoS.
These vulnerabilities could be remotely exploited to allow an increase of privilege, create a Denial-of-Service(DoS), or execute arbitrary code.
The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting XSS.
The vulnerabilities could be remotely exploited resulting in authentication bypass, disclosure of information, unauthorized access, and SQL injection.
This vulnerability could be remotely exploited to perform a Denial of Service(DoS) attack.
The vulnerability could be remotely exploited to allow unauthorized access to the iLO2 or iLO3.
The vulnerability could be remotely exploited resulting in disclosure of information.
The vulnerability could be remotely exploited resulting in unauthorized access to NNMi processes.
The vulnerabilities could be remotely exploited to allow unauthorized access to sensitive information.
The vulnerability could be remotely exploited resulting in unauthorized disclosure of information.
The vulnerabilities could be remotely exploited to allow unauthorized access to sensitive information.
The vulnerabilities could be remotely exploited to allow remote denial of service(DoS) and loss of data.
My perspective is, if you know about a bug that could let someone remotely exploit a system you get the announcement and fix out as soon as possible.
Only people in your network can remotely exploit breaches, if you are in the DMZ, your network is directly the Internet.
We are far from even remotely exploiting the possibilities offered by the existing treaties.
This vulnerability could be exploited remotely.
They could be exploited remotely resulting in information disclosure.
The vulnerability could be exploited remotely to execute arbitrary code.
These bugs can be exploited remotely via applications linked against libcurl.