vulnerability


Also found in: Dictionary, Thesaurus, Acronyms, Encyclopedia, Wikipedia.

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē),
Weakness of susceptibility to damage.
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē)
Susceptibility or weakness; often associated with a particular situation (e.g., illiness, poverty, illiteracy).
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē)
Weakness of susceptibility to damage.
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]
References in periodicals archive ?
There is a continuum of vulnerability from mild to severe, or from low to high (College and Association of Registered Nurses of Alberta, 2005).
In other words, vulnerabilities are fixed if required by compliance mandates; however, if compliance does not require a fix, the vulnerability remains, despite possible implications to the overall security posture of the site.
Siemens has released patches to address this vulnerability. Users are urged to confirm their systems have been updated to the latest version.
"The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
This focus on the costs of vulnerability could obscure its benefits.
Part I provides an overview of human vulnerability theory.
Cygilant said its subscription service unifies vulnerability and patch management into a single offering, which automates the process of detection, prioritization, and patching of vulnerabilities with an auditable change management workflow to continually reduce the attack surface and improve protection against cyberattacks in a cost-effective manner.
Another attack technique called Meltdown specifically targets an Intel processor vulnerability. Apple also released an update for the macOS to defend against this attack, in the 10.13.2 High Sierra update.
Vulnerability management allows you to understand how an attacker would target your company and translate that into actionable preventive strategies and risk management.
In common usage, a vulnerability is a weakness, a corner of our emotional life susceptible to a minor hurt.
This section explains the various works carried out by researchers in the area of vulnerability analyses using security web vulnerability scanners.
Today, when agencies discover vulnerabilities in software or hardware products, they use a classified interagency policy, called the vulnerabilities equities process (VEP), to decide whether a vulnerability should be disclosed or reserved for offensive use.

Full browser ?