Examples of using Multiple vulnerabilities in English and their translations into French
{-}
-
Official
-
Colloquial
Multiple vulnerabilities were discovered in the dissectors for GTPv2,
Multiple vulnerabilities were discovered in the dissectors for the MS-MMS, RTPS, RTPS2,
Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI
Marcin Noga discovered multiple vulnerabilities in readxl, a GNU R package to read Excel files(via the integrated libxls library), which could result in the execution of arbitrary code if a malformed spreadsheet is processed.
Agostino Sarubbo discovered multiple vulnerabilities in zziplib, a library to access Zip archives,
Dave McDaniel discovered multiple vulnerabilities in rtmpdump, a small dumper/library for RTMP media streams,
Jann Horn discovered multiple vulnerabilities in the Xen hypervisor, which may lead to privilege escalation,
Hanno Boeck discovered multiple vulnerabilities in the GStreamer media framework
UNICEF will maintain its office in the Autonomous Region in Muslim Mindanao in view of the multiple vulnerabilities affecting children there,
given their structural constraints and multiple vulnerabilities, often bear a disproportionately heavy impact of these hazards
Landlocked developing countries, given their structural constraints and multiple vulnerabilities, often bear a disproportionately heavy burden from climate hazards and face daunting reconstruction challenges.
from 2001 to 2008, but delivery was modest compared to least developed countries' structural constraints, multiple vulnerabilities and needs.
psychological changes, it marks the point at which she is exposed to multiple vulnerabilities.
Multiple vulnerabilities were discovered in the icotool and wrestool tools of Icoutils,
Multiple vulnerabilities were discovered in the dissectors/parsers for PKTC,
Multiple vulnerabilities were discovered in the dissectors for CAPWAP,
Bearing in mind the multiple vulnerabilities faced by all women in the country,
widespread poverty, multiple vulnerabilities and a long history of political instability advocate for Haiti to remain high on the international agenda, with appropriate levels of support.
widespread poverty, multiple vulnerabilities and a long history of political instability advocate for Haiti to remain high on the international agenda,
Hanno Boeck discovered multiple vulnerabilities in libidn, the GNU library for Internationalized Domain Names(IDNs), allowing a remote