Examples of using Can be exploited in English and their translations into Swedish
{-}
-
Official
-
Colloquial
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
-
Political
In a world where large amounts of data can be exploited, there are huge profits to make from automation.
The capabilities in research and problem-solving developed can be exploited in all professional situations at all management levels.
The project will demonstrate how virtual design and sales technology can be exploited by the apparel industry and how, by means of such technology, consumer driven local production can be established.
This vulnerability can be exploited by a local user to crash system services that use libdbus,
These conditions are also needed to ensure the market is competitive and can be exploited in full.
CVE-2005-4605 Karl Janmar discovered that a signedness error in the procfs code can be exploited to read kernel memory, which may disclose sensitive information.
Control over the network is dispersed and weaknesses in one system can be exploited to attack another.
The internal market is not a place where Eastern European workers can be exploited or subjected to lower social standards.
Some of these vulnerabilities, such as the regime, s near-irrational views on Lebanon, can be exploited to put pressure on the regime.
It also includes information regarding customer searches or interests, that can be exploited for future sales.
The logging code in ypbind was vulnerable to a printf formating attack which can be exploited by passing ypbind a carefully crafted request.
These vulnerabilities can be exploited by malware to penetrate your network, infect your workstations
However, the consensus mechanism itself has 51% vulnerability, which can be exploited by attackers to control the entire blockchain.
how easily it can be exploited,” says the editor Maarit Jaakkola.
Alexey Dobriyan discovered an off-by-one-error in the iov_iter_advance function which can be exploited by local users to crash a system, resulting in a denial of service.
The fact that different metals react in dramatically different ways to sonication can be exploited for innovations in materials science.
A vulnerability has been discovered in the Open Ticket Request System, which can be exploited by malicious users to disclose potentially sensitive information.
Wojciech Purczynski discovered a vulnerability that can be exploited by a local user to obtain superuser privileges on x86_64 systems.
and TSG101, which can be exploited for flow cytometry.
the benefits of SEPA can be exploited.