英語 での The vulnerabilities の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Successful exploitation of the vulnerabilities that are described in this advisory could result in the interruption of voice services, privilege escalation and possible data modification.
According to the researchers, over 54 percent of the vulnerabilities found are critical issues, and 17 percent contained well-known bugs such as Heartbleed, Logjam, Freak, Drown, or Poodle.
A significant number of the vulnerabilities(21%) could also enable an attacker to bypass the authentication protocols that have been put in place on those systems.
While Internet Explorer 7 does not contain code that is affected by the vulnerabilities discussed in this bulletin, the update is cumulative.
Microsoft recommends that customers who installed the 3038314 update prior to April 22 should re-install the update to be fully protected from the vulnerabilities discussed in this bulletin.
It is time to implement meaningful changes at the port to bring to an end the vulnerabilities facilitating the trafficking of ivory and other illicit goods”.
In January 2017, San Diego, California, channel CW6 aired an interesting news segment about the vulnerabilities of Amazon Echo speakers(equipped with the Alexa virtual assistant).
Installing this update will block the vulnerable controls from running in Internet Explorer and will protect your system from the vulnerabilities described in MS16-001.
The vulnerabilities discovered are three(labeled Variant 1 to 3), two of which are classified as Spectre and one is classified as Meltdown.
The vulnerabilities almost always occur on the exchange or wallet side and this is an area that continues to need improvement and more secure protocols, no different than when a bank gets robbed.
Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive, and some may already have been found by rival intelligence agencies or cyber criminals.
Consumers frustrated with the risk the vulnerabilities pose and their potential impact have brought three class action lawsuits against Intel so far, filed in California, Indiana, and Oregon.
Recognizing the vulnerabilities exposed by the global financial crisis, we call upon the UNDP, in consultation with the ILO, MDBs and other relevant international organizations, to.
More information on the vulnerabilities being addressed this month is available at Symantec's free SecurityFocus portal and to our customers through the DeepSight Threat Management System.
The vulnerabilities being exploited are present on devices running recent(but not the most recent) versions of Apple's iOS operating system- specifically, iOS 10 through to early versions of iOS 12.
The vulnerabilities found make it possible for any code, even with reduced permissions, running in any process in that boundary, to read any other data within that boundary.
In this session, based on the vulnerabilities I have discovered in the past, I will introduce the patterns of vulnerabilities frequently observed in Firefox and delineate the root cause of those vulnerabilities. .
The vulnerabilities only affect older versions of Office so customers on Office 2007 or Office 2008 for Mac will have no actions this month.".
Blue saw information warfare as legions of hackers searching out the vulnerabilities of Red's computer systems, which might be exploited by hordes of viruses, worms, logic bombs, or Trojan horses.