Примеры использования This vulnerability на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
This vulnerability is effectively exploitable in any browser.
For Debian 6 Squeeze, this vulnerability has been fixed in version 1:0.6.10-2+squeeze2 of hostapd.
This vulnerability is not exploitable in browsers that support the current CSP standard.
In the version found in Debian 6.0 squeeze, this vulnerability only applies to ICMPv6.
This vulnerability is not exploitable in the default configuration.
The default configuration supplied by Debian does not expose this vulnerability.
This vulnerability is highly dependent on climate-induced atmospheric changes.
We believe this vulnerability was first described publicly on Stack Overflow.
Measures to address this vulnerability need to be taken at all stages of the conflict.
This vulnerability points to two issues of concern.
We believe this vulnerability was first described publicly on Stack Overflow.
There are several factors which serve to explain this vulnerability.
An attacker could provide a the malicious configuration file to trigger this vulnerability.
An attacker could provide a malicious path to trigger this vulnerability.
This vulnerability can be exploited by a local user to crash system services that use libdbus,
This vulnerability might allow an attacker to compromise the private key
This vulnerability allows to display the archives management page,
This vulnerability was introduced in a previously applied patch to the cfingerd package in 1.4.3-3.
This vulnerability is similar to the DYLD_PRINT_TO_FILE exploit that has been patched in OS X Yosemite 10.10.5.