vulnerability

(redirected from security loophole)
Also found in: Dictionary, Thesaurus, Legal, Encyclopedia.

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē),
Weakness of susceptibility to damage.
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē)
Susceptibility or weakness; often associated with a particular situation (e.g., illiness, poverty, illiteracy).
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē)
Weakness of susceptibility to damage.
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]
References in periodicals archive ?
cyber criminals make the most of security loopholes
Researchers at iSEC Partners discovered the security loophole in Femtocells 'network extenders' which are compact boxes and can be deployed in hard-to-reach spots like the top of an apartment building or a home in the mountains for network coverage, CNN reports.
Colonel Ibrahim Sultan Al Zaabi, Deputy Head of the Criminal Investigation Department (CID) at Abu Dhabi Police, confirmed that the CID managed to notice this security loophole through the forensic evidence e-laboratory.
TELECOMWORLDWIRE-14 January 2000-Newly found security loophole could put e-commerce data at risk (C)1994-2000 M2 COMMUNICATIONS LTD http://www.
The researchers said while they had identified a security loophole there is no evidence, to date, that any hackers are taking advantage of it.
It is believed that the security loophole is made when a Hotmail member receives an e-mail message containing embedded JavaScript code that in turn steals the user's password.
While the ministers are required to pay their own fines, reports suggest that they exploit a security loophole to get the amount out of the public's pockets.
The report will be sent to the administrations of various institutions, which will be directed to take measures to address security loopholes noted in the report.
We look for any kind of security loopholes, manage all the updates and any kind of security deficiency that might occur," Williams said.