Examples of using These vulnerabilities in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures(CVE).
These vulnerabilities relate to something called a speculative execution side-channel L1 Terminal Fault(L1TF).
To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures.
Microsoft Windows Millennium Edition(Me) does not include the features that are associated with these vulnerabilities.
These vulnerabilities, which include several"moderately critical" ratings, amount to 17% of the total 144 security risks listed on the website as of February 11, 2010.
To exploit these vulnerabilities, the user must click a specially crafted URL.
These vulnerabilities can be triggered when the attacker and the victim are associated with the same network.
When this security bulletin was issued, had Microsoft received any reports that these vulnerabilities are being exploited?**Consult the following table.
This is known as speculative execution, and it is the heart of these vulnerabilities.
spirit of Meltdown and Spectre, but we have not really seen exactly what these vulnerabilities do.
prevents attempts to exploit these vulnerabilities in the most common network services(FTP, POP3, IMAP) if they are running on the user's computer.
analyzing a wide range of businesses, and the steps needed to mitigate these vulnerabilities through state-of-the-art technology.
These vulnerabilities are caused by the software designer making trust assumptions that permit the software to provide beneficial features,
Adobe says it is aware of reports that these vulnerabilities are being exploited in the wild in targeted attacks designed to trick Windows users into clicking on a malicious PDF file delivered in an email message.
These vulnerabilities are as serious as the Meltdown and Spectre vulnerabilities that were discovered in early 2018 and take advantage of the same speculative execution process, which is designed to speed up data processing and performance.
Due to the severity of these vulnerabilities, the public disclosure of technical details
In this paper, we will cover how these flaws are still present on devices, how these vulnerabilities are actively being abused,
How serious are these vulnerabilities?
And what are these vulnerabilities?
We have been working on fixing these vulnerabilities.