Examples of using These vulnerabilities in English and their translations into Greek
{-}
- 
                        Colloquial
                    
 - 
                        Official
                    
 - 
                        Medicine
                    
 - 
                        Ecclesiastic
                    
 - 
                        Financial
                    
 - 
                        Official/political
                    
 - 
                        Computer
                    
 
These vulnerabilities could be exploited
The most severe of these vulnerabilities could allow elevation of privilege if an attacker injects a client-side script into a user's browser.
However fixing these vulnerabilities is easier
in order to reduce these vulnerabilities.
Often, these vulnerabilities allow attackers to gain access to information
may not be affected by these vulnerabilities.
We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these  exploits.
At the time of publication of this article, Microsoft had not received any information to indicate that these vulnerabilities have been used to attack our customers.
WikiLeaks showed all these vulnerabilities because the US government decided to silence them and did everything they could to do so.
may not be affected by these vulnerabilities.
That tool then continually analyzes Facebook's entire codebase- currently more than 100 million lines of Hack code- to identify these vulnerabilities.
Microsoft has not yet received any information to indicate that these vulnerabilities have been used to attack customers.
Many of these vulnerabilities could be exploited remotely by an attacker to,
An attacker could host a malicious Web site that contains a Web page that is designed to exploit these vulnerabilities.
there is no information to indicate that these vulnerabilities have been used to attack customers.
Upon discovery, Kaspersky Lab reported these vulnerabilities to the affected software vendors
Customers who use any of these  products would be at no risk from an e-mail borne attack that tried to automatically exploit these vulnerabilities.
We have not yet received any information to indicate that these vulnerabilities have been used to attack customers.
may not be affected by these vulnerabilities.
may not be affected by these vulnerabilities.