Examples of using Could be exploited in English and their translations into Swedish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
-
Political
the cores remained at 81 °C since the entire thermal budget could be exploited.
Part of WordPress updates are fixes to security issues that could be exploited by hackers, so it is essential to update as soon as possible.
Several problems have been discovered in telnet clients that could be exploited by malicious daemons the client connects to.
This vulnerability could be exploited to trick users of PhoneGap apps into executing click events and other unintended user interactions.
This implementation was found to contain an integer overflow vulnerability which could be exploited to execute arbitrary code.
This will help to eliminate vulnerabilities that could be exploited by malware if you visit a cybersquatter's website.
CVE-2005-3409 A NULL pointer dereferencing has been discovered that could be exploited to crash the service.
A program has certain vulnerabilities that could be exploited for malware to get into a system, but vendors patch them
a web-based IRC client, which could be exploited to execute arbitrary code.
The purpose of the plan was to ensure that Baltic cod stocks could be exploited under sustainable economic,
leading to a crash that could be exploited by the attacker.
The result will be an information environment riddled with vulnerabilities that could be exploited by even the most repressive
This now includes non-human operated computers(like IoT devices) that could be exploited as entry points to local networks.
he fears they could be exploited.
Calling a validator on a function actually written in some other language was not checked for and could be exploited for privilege-escalation purposes.
The risk that the initiative could be exploited by certain non-governmental organisations(NGOs) or by a given sector of
Software has certain weak spots that could be exploited for malicious software to enter a computer,
Software comes with certain weak spots that could be exploited for malware to get into a computer, but they're patched by
The aim is to detect potential vulnerabilities and weaknesses that could be exploited by a potential hacker attack,
Software has certain weak spots that could be exploited for malicious software to get into a computer,