Examples of using Vulnerabilities could in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
These vulnerabilities could be remotely exploited to execute arbitrary code.
Critical vulnerabilities have been identified in Adobe Shockwave Player. The vulnerabilities could allow an attacker, who successfully exploits the vulnerabilities, to run malicious code on the affected system.
The vulnerabilities could be exploited remotely to create a Denial of Service DoS.
The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file.
These vulnerabilities could, if exploited, allow attackers to gain access to data previously considered protected.
These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
Some vulnerabilities could allow remote attackers to cause a Denial-of-Service and possibly execute arbitrary code.
These vulnerabilities could be exploited remotely by an unauthorized user to modify data, prompts, or responses.
The vulnerabilities could be remotely exploited to allow remote denial of service(DoS) and loss of data.
These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities. .
The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.
These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system.
The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application.
The vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
These vulnerabilities could be potentially exploited by remote attackers tricking an authenticated user to click on specially-crafted links.
The threats and vulnerabilities could be from viruses and malware from within the device or from an external source like the network it connects to.
These vulnerabilities could be exploited remotely to create a Denial-of-Service(DoS) gain unauthorized access, and perform cross site scripting XSS.
The most severe vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes the user to a targeted SharePoint site.
The vulnerabilities could be exploited remotely resulting in unauthorized access, unauthorized information disclosure, Denial of Service(DoS), and URL redirection.
The vulnerability could be used by attackers to elevate privileges to the SYSTEM level.
This vulnerability could allow remote code execution if….
These vulnerabilities can be exploited to execute arbitrary code.
Vulnerabilities can be fixed by installing updated packages now.
The vulnerability could be exploited over the network to extend privileges of users.
This vulnerability could be exploited remotely.
More than 70 vulnerabilities can be corrected now by installing iTunes 10.6.
The vulnerability could allow remote code execution if the icon….
Thrangrycat vulnerability can be used for malware invasion in Cisco equipment.
The vulnerability can lead to Denial of Service DoS.