Examples of using Could exploit in English and their translations into Greek
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Official/political
-
Computer
These are weaknesses that hackers could exploit.
Hackers could exploit this to get sensitive information.
If there weren't a gap nobody could exploit it.
Attackers could exploit this vulnerability to execute a controlled crash.
If Section thinks you have got a weakness an enemy could exploit, you become an enemy too.
An attacker could exploit this vulnerability by sending a malicious request to the application.
We don't want any weak point in the EU that criminals could exploit.
A remote attacker could exploit this vulnerability to gain access to highly sensitive information.
We don't want to see any weak link point in the EU that criminals could exploit.
An attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted application.
In worst cases,these themes contain malicious code with backdoors that hackers could exploit.
A remote attacker could exploit some of these vulnerabilities to obtain access to sensitive information.
This was bad for the cancer, andthe loss of mitochondria represents another weakness doctors could exploit.
An attacker could exploit this vulnerability by sending an invalid content-type as part of a file upload request.
An attacker could also create an HTML-based e-mail message that could exploit this vulnerability.
Hackers could exploit the flaw to execute malicious code with kernel privileges, said a report in the Bitdefender blog.
Madison worried about majorities abusing minorities; he did not fear that minorities could exploit“the greater number.”.
This way, it could exploit new commercial opportunities, including those arising from the transition to a low-carbon economy.
When a user visits an attacker's Web site,the attacker could exploit the vulnerability without any other user action.
Conversely, the UK could exploit the opportunities that exist in partnering with the US in this area of technology and capability.
If you were to visit an attacker's Web site,the attacker could exploit this vulnerability without any other action on your part.
Washington could exploit this new openness to gain leverage in Syria by quietly backing parties that favor pro-US positions-a plus.
If a user visited an attacker's Web site,the attacker could exploit this vulnerability without any other user action.
The secret report from the head of the US Embassy in Damascus outlined“vulnerabilities” of the Syrian government that Washington could exploit.
Kaspersky Lab experts investigated how cybercriminals could exploit new biometric ATM authentication technologies planned by banks.
(ii) to scare the Armenian people away from their ancestral lands so that the state andconcerned corporations could exploit it without interference.
This prevents the browser from accessing sites that could exploit browser vulnerabilities or download dangerous software.
An attacker could exploit this information so as to call you up(find your number in a catalog or even from facebook or send an e-mail).
This prevents the browser from accessing websites that could exploit browser vulnerabilities or to download dangerous software.
Riyadh, for example, could exploit its close ties to Islamabad- which has a history of illicit proliferation and a rapidly expanding nuclear arsenal- to become a nuclear power almost overnight.