Examples of using Multiple vulnerabilities in English and their translations into Russian
{-}
-
Official
-
Colloquial
DSA-2545-1 qemu-- multiple vulnerabilities.
Multiple vulnerabilities were discovered in the poppler PDF rendering library.
DSA-1765-1 horde3-- Multiple vulnerabilities.
Multiple vulnerabilities were discovered in libssh by Florian Weimer and Xi Wang.
DSA-2454-2 openssl-- multiple vulnerabilities.
Multiple vulnerabilities were discovered in the implementation of the Perl programming language.
DSA-1979-1 lintian-- multiple vulnerabilities.
Multiple vulnerabilities were discovered in zoneminder, a Linux video camera security and surveillance solution.
DSA-1792-1 drupal6-- multiple vulnerabilities.
Multiple vulnerabilities have been discovered in Irssi, a terminal-based IRC client which can result in denial of service.
DSA-2368-1 lighttpd-- multiple vulnerabilities.
Multiple vulnerabilities have been found in Redmine, a project management web application, which may result in information disclosure.
DSA-2542-1 qemu-kvm-- multiple vulnerabilities.
There are multiple vulnerabilities in mediaserver that can cause a Denial of Service by crashing the mediaserver process.
DSA-1564-1 wordpress-- multiple vulnerabilities.
There are multiple vulnerabilities in libstagefright that could enable a local malicious application to execute arbitrary code within the context of the mediaserver service.
DSA-2163-1 python-django-- multiple vulnerabilities.
Michal Zalewski discovered multiple vulnerabilities in SQLite, which may result in denial of service or the execution of arbitrary code.
DSA-2315-1 openoffice. org-- multiple vulnerabilities.
John Lightsey discovered multiple vulnerabilities in Module:: Signature, a Perl module to manipulate CPAN SIGNATURE files.
This could be extended to address victims of gender-based violence, andother groups who face multiple vulnerabilities, such as ethnic minorities.
Sidhpurwala discovered multiple vulnerabilities in various tools shipped by the tiff library.
Therefore, it was essential to demonstrate stronger and renewed partnership andsolidarity on the part of partners towards addressing structural weakness and multiple vulnerabilities of least developed countries.
Mateusz Jurczyk discovered multiple vulnerabilities in Freetype.
There are multiple vulnerabilities in mediaserver that can enable a local malicious application to execute arbitrary code within the context of a privileged native service.
Hossein Lotfi andJakub Jirasek from Secunia Research have discovered multiple vulnerabilities in LibRaw, a library for reading RAW images.
Multiple vulnerabilities have been been fixed in the Drupal content management framework, resulting in information disclosure, insufficient validation, cross-site scripting and cross-site request forgery.
Miroslav Lichvar of Red Hat discovered multiple vulnerabilities in chrony, an alternative NTP client and server.
To prevent and diminish multiple vulnerabilities, it is important for all countries to work to develop sustainable and comprehensive systems to provide universally a basic level of social security.
There is also a tendency for human problems to cluster and to create multiple vulnerabilities, which makes confronting them much more difficult.