Examples of using The vulnerability in English and their translations into Hebrew
{-}
- 
                        Colloquial
                    
- 
                        Ecclesiastic
                    
- 
                        Computer
                    
- 
                        Programming
                    
They went and reported this to the  law enforcement agencies, after anonymizing it, and the vulnerability here is simply the  user interface wasn't good enough.
Concerns about potential infection among thousands of passengers at sea exposes the vulnerability of cruise ships to viral illnesses,
To exploit the vulnerability an attacker will alter a variable that is passed to one of these functions to cause it to include malicious code from a remote resource.
These were tests to determine the vulnerability of large government buildings and public transport to attack.
It exploits the vulnerability of the  virus in that, when a person gets infected,
Leaders are well aware of the vulnerability of the  child brain, and the  importance of getting the  indoctrination in early.
In addition to the vulnerability scanner, the  software also looks for other“system anomalies” after running.
In addition to the vulnerability scanner tool, the  program also includes
This negative advertising concerns the vulnerability of the  screens, the  easy scratching surfaces
These techniques utilize the vulnerability of the  website code as well as the  server type.
Probe or test the vulnerability of, or otherwise circumvent(or attempt to circumvent)
We secured the vulnerability with ZenCart on the  infected site,
Scan, or test the vulnerability of our Services or any system or network;
Scanning, or testing the vulnerability of any of our technical systems or networks unless all
Later on, Egyptian planes would continue to exploit the vulnerability of the  nearly non-existent Israeli Air Force, conducting sorties over central Israel.
These factors exacerbate the vulnerability of certain groups,
(a) Recognizing the vulnerability of child victims and adapting procedures to recognize their special needs,
Scanning, or testing the vulnerability of any of the  technical systems or networks unless all
Probe, scan or test the vulnerability of our Services or any system or network.
Religious leaders are well aware of the vulnerability of the  child brain, and the  importance of getting the  indoctrination in early.