Examples of using Can be exploited in English and their translations into Danish
{-}
- 
                        Official
                    
- 
                        Colloquial
                    
- 
                        Medicine
                    
- 
                        Financial
                    
- 
                        Ecclesiastic
                    
- 
                        Official/political
                    
- 
                        Computer
                    
Precise provisions are  needed to avoid legal loopholes that can be exploited by the increasingly widespread extremist political groups, while allowing minorities
President Bush, or should we see new opportunities that can be exploited over the coming days, weeks and months?
rather than where it can be exploited or simply wasted.
It goes without saying that these vulnerabilities could be exploited.
It could be exploited to generate false information,
That could be exploited with this new version as well.
Well, to see if any of those powers could be exploited.- Why?
Once authenticated on the login page for administrators it could be exploited.
This is  the kind of vulnerability that could be exploited by a worm that could  give rise to a worm reminiscent of the Blaster Worm.
This bug could be exploited by an attacker to overwrite kernel memory from an unprivileged userland process, leading to privilege escalation.
However, the risk that the initiative could be exploited by certain non-governmental organisations(NGOs)
This program could be exploited by malevolent third parties to redirect you to dangerous websites,
how those inefficiencies and irrationalities could be exploited by bureaucrats for their own personal gain.
ArcadeCake could be exploited by cyber criminals to promote malicious content
a loophole which could be exploited by attackers to upload
You might think that this system could be exploited by people over inflating product reviews in order to generate extra sales for them.
leading to a crash that could be exploited by the attacker.
This could be exploited in environments where uploads of some files are  externally blocked,
the search engine in particular could be exploited by cyber criminals to distribute malware.
It means that the application does not review them, and it could be exploited by a malicious third party