Examples of using These vulnerabilities in English and their translations into Russian
{-}
-
Official
-
Colloquial
However, the company still didn't fix these vulnerabilities.
These vulnerabilities leave applications open to exploitation.
WatchOS are the only ones to escape these vulnerabilities.
Many of these vulnerabilities could have been responsibly disclosed and patched.
We stress the need to overcome these vulnerabilities and build resilience.
These vulnerabilities predominantly affect DNS servers providing recursive service.
Additional details on these vulnerabilities can be found at https://ikiwiki.
It's pretty hard to say that there is one real solution protection against these vulnerabilities.
In particular, these vulnerabilities affect to SWAT, the Samba Web Administration Tool.
According to Microsoft, patches have been issued to fix these vulnerabilities used by NSA hacking tools.
These vulnerabilities might result in denial of service or, potentially, execution of arbitrary code.
It is called‘zero-day' because Apple didn't know about these vulnerabilities, and they had zero day to fix them.
These vulnerabilities are present whether or not DNSSEC validation is enabled in the server configuration.
The stable distribution(squeeze) and the unstable distribution(sid) are not affected, these vulnerabilities have been fixed prior to the release of Debian 6.0 squeeze.
These vulnerabilities were fixed in Libreoffice 5.0.2, so the version in the stable distribution(stretch) is not affected.
Thus a new programme of action needs to focus on these vulnerabilities and revise priorities to address issues specific to least developed countries.
These vulnerabilities affecting Qualcomm components were released as part of Qualcomm AMSS security bulletins between 2014-2016.
An attacker could exploit these vulnerabilities to overwrite arbitrary files or disclose system information.
These vulnerabilities affect Qualcomm components and are described in further detail in Qualcomm AMSS security bulletins in 2014-2016.
Even a single instance of one of these vulnerabilities negates the protection provided by elaborate network defenses.
These vulnerabilities affect Qualcomm components and are described in further detail in the Qualcomm AMSS October 2016 security bulletin.
A remote attacker could exploit these vulnerabilities and call arbitrary functions by sending crafted HTTP requests.
These vulnerabilities, collectively known as ImageTragick, are the consequence of lack of sanitization of untrusted input.
Climate change further exacerbates these vulnerabilities, leaving the viability and very physical existence of some SIDS at stake.
These vulnerabilities are amplified by disparities in national law, regulations and practices related to the use of ICTs.
Problems arise as these vulnerabilities can allow attackers to gain access to personal information while you're browsing the web.
These vulnerabilities might result in denial of service(application crash) or, potentially, execution of arbitrary code.
These vulnerabilities relate to execution of arbitrary code, breakouts of the Java sandbox, information disclosure and denial of service.
These vulnerabilities are particularly critical if Imagemagick processes images coming from remote parties, such as part of a web service.
These vulnerabilities allow remote attackers to cause a denial of service, via resource consumption or application crash.

