Examples of using Known vulnerabilities in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
The integrated Software Updater offers an additional layer of protection against known vulnerabilities.
The DHCP client shows several known vulnerabilities that might lead to a Denial-of-Service.
Besides this, the well known vulnerabilities in OpenSSL affect NetBSD also.
Turbolinux has published patches for known vulnerabilities in openLDAP, openSSH, and Flashplayer.
ESET Network Attack Protection improves detection of known vulnerabilities on the network level.
Since it's integrated, you can easily avoid attacks based on known vulnerabilities.
Turbolinux has published patches for known vulnerabilities in fetchmail, xpdf,
it is relatively easy to exploit known vulnerabilities.
Wyse Simple Imager(WSI) includes older versions version of TFTPD32 that contains publicly known vulnerabilities.
This phase leads to the system readiness phase, whereby the target is essentially checked for all known vulnerabilities.
improves detection of known vulnerabilities on the network level.
Some already known vulnerabilities(CAN-2004-0754, CAN-2004-0784,
In this context, it makes sense to correct any known vulnerabilities by planning a definition of optimal target processes.
We can't lose sight of defending against these known vulnerabilities by entrusting security to the next silver bullet technology;
Several known vulnerabilities are now fixed, allowing some attack vectors like Denial-of-Service,
which is why even known vulnerabilities can persist for years.
patched versions that aren't susceptible to known vulnerabilities.
The operating system is scanned for known vulnerabilities periodically and kept up to date with the latest developments in the field of cyber security.
One of them has more than 50 known vulnerabilities, and experts believe that the Graboid operator compromised these hosts specifically to control its malware.
security flaws and known vulnerabilities to make your visit to our site as safe as possible.