vulnerability

(redirected from Vulnerabilities)
Also found in: Dictionary, Thesaurus, Legal, Encyclopedia.

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē),
Weakness of susceptibility to damage.
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē)
Susceptibility or weakness; often associated with a particular situation (e.g., illiness, poverty, illiteracy).
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē)
Weakness of susceptibility to damage.
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]
References in periodicals archive ?
Thirty new Integrity rules, including rules for finding: - Google Hacking vulnerabilities such as pages containing configuration information, hidden content, error information, and points of entry.
Most organizations scan for vulnerabilities only rarely, perhaps once a quarter.
It was indicated at the beginning of this article that the internet provides us with instant access to a vast amount of data; however, it has created security vulnerabilities.
According to Rob Ayoub, industry manager at Frost & Sullivan, "During the first three quarters of 2006, companies that leveraged in-house research with external talent were the most successful in discovering high-severity vulnerabilities.
The busiest month in 2006 for vulnerability disclosure was June, while the busiest week was the week before Thanksgiving and the most popular day of the week to disclose vulnerabilities was Tuesday.
The software scans Oracle, Microsoft SQL Server, IBM DB2, and Sybase databases for hundreds of vulnerabilities that facilitate SQL injection, buffer overflow, and other attacks.
Determina Vulnerability Protection Suite (VPS), which does not rely on attack signatures or customer created security policies, already protects its customers against these vulnerabilities.
Control system applications and devices can suffer from the same classes of vulnerabilities as IT applications and devices such as missing control system security patches, unchanged default passwords, and weak configurations.
AUSTIN, Texas -- TippingPoint, a division of 3Com and the leader in intrusion prevention, today announced the discovery and patch of two new vulnerabilities in Microsoft Internet Explorer disclosed through TippingPoint's Zero Day Initiative (ZDI).
eEye Digital Security([R]), a leading developer of network security and vulnerability management software solutions, as well as the industry's foremost contributor to security research and education, today announced that it is offering the industry's first vulnerability tracking site that focuses exclusively on zero-day vulnerabilities, or those vulnerabilities in which technical details regarding exploitation methods are in public circulation prior to the availability of a software patch.
the leading provider of on demand vulnerability management and policy compliance solutions, today announced the availability of a free network scanning service to help companies find and eliminate vulnerabilities listed in the annual SANS Top 20 update for 2006 that was announced earlier today.
NIST has adopted the Common Vulnerable Scoring System (CVSS) for rating the impact of vulnerabilities published within the National Vulnerability Database (NVD).