Examples of using These vulnerabilities in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
I am investigating these vulnerabilities.
These vulnerabilities were discovered over a year ago.
How could an attacker exploit these vulnerabilities?
To exploit these vulnerabilities, the user must click a specially crafted URL.
What patches are available to address these vulnerabilities?
Because of these vulnerabilities millions of WhatsApp users were left exposed to security problems.
Is Internet Explorer 9 Beta affected by these vulnerabilities?
These vulnerabilities can be triggered when the attacker and the victim are associated with the same network.
Cisco has released software updates to address these vulnerabilities.
To mitigate risk and prevent these vulnerabilities, you can do the following.
There are multiple ways an attacker could exploit these vulnerabilities.
You can learn more about these vulnerabilities at Google Project Zero.
Adobe is not aware of any attacks exploiting these vulnerabilities.
For example, these vulnerabilities can exist in content management systems(CMS) or web server software.
The program offers up to $10,000 to hackers who can find these vulnerabilities.
Adobe is not aware of any attacks exploiting these vulnerabilities against Adobe Photoshop Elements to date.
This is known as speculative execution, and it is the heart of these vulnerabilities.
These vulnerabilities affect the Distributed Component Object Model(DCOM) interface in RPCSS.
Adobe is not aware of any attacks exploiting these vulnerabilities against Adobe Photoshop.
If we don't direct it in a humane way, the digital revolution in agriculture is likely to heighten these vulnerabilities.
To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures.
Independent researchers separately discovered and named these vulnerabilities“Spectre” and“Meltdown.”.
To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures(CVE).
When this security bulletin was issued, had Microsoft received any reports that these vulnerabilities are being exploited?
These vulnerabilities relate to something called a speculative execution side-channel L1 Terminal Fault(L1TF).
By open-sourcing more of the code, the developer community will be able to discover and patch these vulnerabilities much faster.
To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures.
Microsoft Windows Millennium Edition(Me) does not include the features that are associated with these vulnerabilities.
To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures(CVE).
An attacker within wireless range of a Wi-Fi network can exploit these vulnerabilities using key reinstallation attacks Â(KRACKs).