Examples of using Multiple vulnerabilities in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Rootkit[software] that exploits multiple vulnerabilities.
Multiple vulnerabilities have been found in Wi-Fi Protected Access 2*.
ITAS Team discovered multiple vulnerabilities in ProjectSend.
Multiple vulnerabilities have been discovered in RC4 over the years, making it possible to crack within days, or even hours.
This security update resolves multiple vulnerabilities in Microsoft Windows.
Last week multiple vulnerabilities were made public in the popular image manipulation software, ImageMagick.
In order to gain root or kernel privileges on Android and fully compromise a device,an attacker would have to chain multiple vulnerabilities together.
They discovered multiple vulnerabilities in connected homes- ADSLZone.
Investigators dug into the cybersecurity practices of seven contractors working for the US Missile Defense Agency andfound multiple vulnerabilities.
On January 4, 2018, multiple vulnerabilities in the design of modern CPUs were disclosed.
Last week at a conference in Malaysia, Felix Lindner, an expert in network equipment security,said he had discovered multiple vulnerabilities in Huawei's routers.
Symantec research in 2015 found multiple vulnerabilities in 50 commercially available devices.
At a conference in Kuala Lumpur last week, Felix Lindner, a leading expert in network equipment security,said he had discovered multiple vulnerabilities in Huawei's routers.
Unfortunately, with this convenience have come multiple vulnerabilities and large-scale attacks which have exploited UPnP.
Security researchers have unearthed multiple vulnerabilities in hundreds of GPS services that could enable attackers to expose a whole host of sensitive data on millions of online location tracking devices managed by vulnerable GPS services.
Critical Symlinks Vulnerability in Drupal The onlyadvisory with critical severity includes patches for multiple vulnerabilities in a third-party library, called' Archive_Tar,' that Drupal Core uses for creating, listing, extracting, and adding files to tar archives.
Kaspersky Lab researchers found multiple vulnerabilities in certain smart cameras that could allow attackers to obtain remote access to video and audio feeds.
According to the court documents seen by The Hacker News,Glenn and one of his colleagues discovered multiple vulnerabilities in Cisco Video Surveillance Manager(VSM) suite in September 2008 and tried to report them to the company in October 2008.
Multiple code vulnerabilities might result in lack of money and business disruption.
A Critical Patch Update(CPU) is a collection of patches for multiple security vulnerabilities.
Due to this security update resolving multiple significant vulnerabilities within the Microsoft Outlook application, it must remain installed.
Maintainers of the PHP programming language recentlyreleased the latest versions of PHP to patch multiple high-severity vulnerabilities in its….
The only thing that was known is it's very, very complex on the Windows part, the dropper part,used multiple zero-day vulnerabilities.
Two weeks ago, United paid two hackers more than1 Million frequent-flyer miles each for finding multiple security vulnerabilities in the Airline's IT system.
Kaspersky Lab researchers have discovered multiple security vulnerabilities in popular smart cameras that are frequently used as baby monitors, or for internal home and office security surveillance.
In December 2015, the"AVG Web TuneUp" Google Chrome extension(automatically installed with AVG AntiVirus)was revealed to contain multiple critical security vulnerabilities.
Stuxnet took advantage of multiple zero-day vulnerabilities in Microsoft Windows, including an escalation-of-privilege flaw and exploited Microsoft's AutoRun functionality to spread across computers via infected USB drives.
Security researchers have discovered multiple critical vulnerabilities in some of the popular self-encrypting solid state drives(SSD) that could allow an attacker to decrypt disk encryption and recover protected data without knowing the password for the disk.
Although Microsoft patched multiple DLL load hijacking vulnerabilities since last summer, Windows and Internet Explorer 9(IE9) can still be exploited, a security company warned May 6.
Besides this, Microsoft has also patched multiple remote code execution vulnerabilities in Microsoft Office and Microsoft Excel, which could allow attackers to take control of the targeted systems.