What is the translation of " VULNERABILITIES " in English?

Noun
vulnerabilities
verwundbarkeit
verletzlichkeit
schwachstelle
anfälligkeit
sicherheitslücke
sicherheitsanfälligkeit
verletzbarkeit
vulnerabilität
lücke
gefährdung

Examples of using Vulnerabilities in German and their translations into English

{-}
  • Colloquial category close
  • Official category close
  • Ecclesiastic category close
  • Medicine category close
  • Financial category close
  • Ecclesiastic category close
  • Political category close
  • Computer category close
  • Programming category close
  • Official/political category close
  • Political category close
Folgen dieser CPU-Sicherheitslücken Vulnerabilities.
Consequences of these CPU vulnerabilities.
Multiple vulnerabilities in Ruby veröffentlicht am 8. Aug. 2008.
Multiple vulnerabilities in Ruby published at 8 Aug, 2008.
Link zum generellen Checker- z.B. SSL-Schwachstellen- e.g. SSL vulnerabilities.
Link to general checker- e.g. SSL vulnerabilities.
Arbitrary code execution vulnerabilities veröffentlicht am 20. Juni 2008.
Arbitrary code execution vulnerabilities published at 20 Jun, 2008.
BIGUMBRELLADSC','Dies schutzt vor Angriffenvia XSS vulnerabilities.
BIGUMBRELLADSC','This protects you from almost attacks via XSS vulnerabilities.
Laut Common Vulnerabilities and Exposures gab es allein im Jahr 2017 14.600 neue Sicherheitslücken.
According to Common Vulnerabilities and Exposures, 14,600 new vulnerabilities were identified in 2017 alone.
Fehlkonfigurationen verursachen auch bei aktuellem Softwarestand Vulnerabilities.
Improper configuration can cause vulnerability, even with up-to-date software.
Multiple vulnerabilities exist in the Die Cisco PGW 2200 Softswitches zeigen mehrere voneinander unabhängige Schwachstellen.
Multiple vulnerabilities exist in the Cisco PGW 2200 Softswitch series of products.
Der Code wird eingespritzt, wie es scheint, via vulnerabilities found in WordPress plugins.
The code is injected as it appears, via vulnerabilities found in WordPress plugins.
Beliebtes Open-Source Content-Management-System freigegeben Drupal seine neue Versionen 6.36 und7.38 that set a list of vulnerabilities.….
Popular open source content management system Drupal released its new versions 6.36 and7.38 that set a list of vulnerabilities.….
Sicherheitsbereiche wie beispielsweise Virenschutz, Update/Patch, Vulnerabilities oder Inventory können gegen Regeln geprüft werden.
The rules can be applied amongst others to security sections, such as virus protection, updates, patches, vulnerabilities, or inventory.
Laut der Studie"Laws of Vulnerabilities 2.0" brauchen Unternehmen im Durchschnitt 59 Tage, um Patches für Sicherheitslücken zu installieren.
According to the laws of vulnerabilities 2.0 research, the average time it takes companies to patch their vulnerabilities is 59 days.
Scannen und eine mögliche 45 Nettowerkzeug Tools, Netzwerk-Monitor für vulnerabilities. Over. Beschreibung.
Scan and a potential 45 net tools, network monitor for vulnerabilities. Over. Description.
Potential security vulnerabilities have been identified with In der HP ArcSight Connector Appliance und HP ArcSight Logger wurden verschiedene potenzielle Schwachstellen lokalisiert.
Potential security vulnerabilities have been identified with HP ArcSight Connector Appliance and HP ArcSight Logger.
Während des Laufens auf Ihrem PC, es kann Ihre PC-Leistung verringern,cause security vulnerabilities and browser crushes.
While running on your PC, it may decrease your PC performance,cause security vulnerabilities and browser crushes.
A worm Trojan that exploits the security vulnerabilities on the Javascring-based web pages, and then download and install malware to the affected machines….
A worm Trojan that exploits the security vulnerabilities on the Javascring-based web pages, and then download and install malware to the affected machines….
Die NVD beinhaltet unter anderem die Schwachstellen, die im Industrie-Standard„Common Vulnerabilities and Exposures"(CVE) erfasst werden.
The NVD contains the weaknesses recorded in the industry standard"Common Vulnerabilities and Exposures"(CVE), among others.
As the malware uses software application vulnerabilities to contaminate target hosts, es kann Teil eines gefährlichen Koinfektion mit Ransomware und Trojaner sein.
As the malware uses software application vulnerabilities to contaminate target hosts, it can be part of a dangerous co-infection with ransomware and Trojans.
Die öffentliche API für Instagram ist Besitz von Facebook, but Sopas explained that Facebook security engineers were not convinced thatRFD issues are serious security vulnerabilities.
The public API for Instagram is owned by Facebook, but Sopas explained that Facebook security engineers were not convinced thatRFD issues are serious security vulnerabilities.
EMET ist ein Werkzeug, das Windows-Plattformen gegen Exploits von Vulnerabilities mit einer Reihe von Mitigations-Massnahmen schützt.
EMET is an utility to help protect theWindows operating system platforms against exploitation of vulnerabilities through a series of security mitigation technologies.
The Pros and Cons of Posting Vulnerabilities, 5. Oktober 2000 Obwohl man sich im Nebel des FUD bewegt, der"full disclosure" umgibt, ist es doch ein nicht enden wollendes undankbares Ziel.
The Pros and Cons of Posting Vulnerabilities, October 5, 2000 Dissipating the smokescreen of FUD surrounding"full disclosure" is a never ending thankless task.
Harmful sites, oder echte Websites, die tatsächlich wurde gehackt, cancontaminate your maker through exploit sets that use vulnerabilities on your computer system to install this Trojan without your consent of understanding.
Harmful sites, or genuine websites that have actually been hacked,can contaminate your maker through exploit sets that use vulnerabilities on your computer system to install this Trojan without your consent of understanding.
As the malware uses software application vulnerabilities to contaminate target hosts, es kann mit Ransomware-Komponente eines schädlichen Koinfektion und Trojanern auch.
As the malware uses software application vulnerabilities to contaminate target hosts, it can be component of a harmful co-infection with ransomware and also Trojans.
Eine aktuelle Studie von iViz Sicherheit freigegeben, Ein Testservice für Web-Anwendungen durch Bikash Barai und Nilanjan De gegründet, berichtet, dass, der wichtigsten Web-Browsern,Chrom hatten die meisten“critical vulnerabilities” mit 152.
A recent study released by iViZ Security, a testing service for Web applications founded by Bikash Barai and Nilanjan De, reported that, of the major Web browsers,Chrome had the most“critical vulnerabilities” with 152.
As the malware uses software application vulnerabilities to contaminate target hosts, er kann Teil einer unsicheren Koinfektion mit Ransomware und Trojanern auch.
As the malware uses software application vulnerabilities to contaminate target hosts, it can be part of an unsafe co-infection with ransomware and also Trojans.
Vulnerabilities werden zunehmend komplexer und bis Anbietern deutlich bei der Schaffung eines florierenden Security Research Team innerhalb ihrer eigenen Organisation zu investieren, sie werden auf Wettbewerben wie Pwn2Own, die durch die Unordnung schneiden können Schwachstellen zu ermitteln und auf Risiko der Basis angewiesen.”.
Vulnerabilities are increasing in complexity and until vendors significantly invest in creating a thriving security research team within their own organization, they will rely on contests like Pwn2Own that can cut through the clutter and identify vulnerabilities based on risk.”.
As the malware uses software application vulnerabilities to infect target hosts, es kann als Trojaner auch mit Ransomware-Komponente einer schädlichen Co-Infektion.
As the malware uses software application vulnerabilities to infect target hosts, it can be component of a harmful co-infection with ransomware as well as Trojans.
As the malware makes use of software application vulnerabilities to contaminate target hosts, er kann Teil einer unsicheren Koinfektion mit Ransomware sowie Trojaner sein.
As the malware makes use of software application vulnerabilities to contaminate target hosts, it can be part of an unsafe co-infection with ransomware as well as Trojans.
Summary of the typical smart contracts vulnerabilities", in welchem wir alle gefährlichen Voraussetzungen und die typischen Sicherheitsprobleme in der Solidity Sprache beschreiben.
For more information see ourarticle" Summary of the typical smart contracts vulnerabilities" where we describe all dangerous assumptions and typical security issues in Solidity language.
Results: 29, Time: 0.0208

Top dictionary queries

German - English