Examples of using Known vulnerabilities in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
System Advisor scans your device and alerts about known vulnerabilities such as KRACK,
Anti-exploit helps protect against any known vulnerabilities discovered in your system
(g) ensure that ICT hardware and software products and services are provided with up to date software that does not contain known vulnerabilities, and are provided with mechanisms for secure software updates.
hardware that do not contain publicly known vulnerabilities, and are provided with mechanisms for secure updates.
Evaluation activities should include at least“a review to demonstrate the absence of publicly known vulnerabilities and testing to demonstrate that the ICT products,
The evaluation activities shall include at least a review of the non-applicability of publicly known vulnerabilities, and testing that the ICT processes,
a review to demonstrate the absence of publicly known vulnerabilities and testing to demonstrate that the ICT products,
tachograph cards to confirm that known vulnerabilities cannot be exploited by individuals in possession of publicly available knowledge.
There's also anti-exploit, which helps protect against any known vulnerabilities identified in your system
Additionally, attackers will continue to rely on known vulnerabilities that remain unpatched in corporate networks for 99.99 per cent of exploits,
The Microsoft Schannel implementation of TLS 1.0(regarding the known vulnerabilities that have been reported to Microsoft as of the publication date of this article)
wherever needed- provide assistance in fixing known vulnerabilities.
Evaluation activities should include at least“a review to demonstrate the absence of publicly known vulnerabilities; testing to demonstrate that the ICT products,
a review to demonstrate the absence of publicly known vulnerabilities; testing to demonstrate that the ICT products,
Exploiting a known vulnerability.
It's exploiting a known vulnerability.
It reportedly exploited a known vulnerability.
The intruder installs a rootkit on a computer using a user action, by exploiting a known vulnerability or cracking a password.
Look for known vulnerabilities.
Exploitation of known vulnerabilities.