vulnerability


Also found in: Dictionary, Thesaurus, Legal, Acronyms, Encyclopedia, Wikipedia.

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē),
Weakness of susceptibility to damage.
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē)
Susceptibility or weakness; often associated with a particular situation (e.g., illiness, poverty, illiteracy).
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]

vul·ner·a·bil·i·ty

(vŭl'nĕr-ă-bil'i-tē)
Weakness of susceptibility to damage.
[L. vulnerabilis, susceptible to injury, fr. vulnero, to wound, fr. vulnus, wound]
References in periodicals archive ?
As technology continues to advance, so do the threats that look for vulnerabilities to exploit," said Matt Watchinksi, Director of the Sourcefire Vulnerability Research Team.
Over the last five years, eEye has been recognized by industry experts as the preeminent organization in the discovery of the most critical vulnerabilities in various platforms and applications, including the vulnerabilities subsequently leveraged by the Sasser, Witty and Code Red worms, as well as the Microsoft ASN vulnerability and hundreds of other important discoveries.
0 desktops, affording organizations with more centralized control over vulnerability testing.
0, the Reporting Console empowers users with a means to set and manage scan permissions across multiple AppScan desktops, and distribute web-based vulnerability reports across the enterprise, arming users with metrics and explanations of where vulnerabilities are found and how to fix them.
Enterprise-wide vulnerabilities to hackers and malicious attacks can now be detected more quickly and easily than ever before, thanks to a new Automated Vulnerability Detection System (AVDS) from Beyond Security, a leading provider of security assessment technologies.
contentType attribute contains the same vulnerability found in the addRequestHeader() and it can be exploited in the same way because Adobe Flash does not check the validity of the attribute's value before building the HTTP request.
Frost & Sullivan vulnerability tracker is compiled from various public sources to analyze the vulnerability landscape from 2000 to the present.
DevPartner SecurityChecker helps efficiently achieve application security by automatically identifying security vulnerabilities through a combination of both white-box (code scanning and run-time analysis) and black-box (penetration testing) testing techniques and pinpoints the location of the vulnerability in source code.
What is required is a shift in the fundamental philosophy of network security from attack management to vulnerability management.
Federal Government agencies, has announced the launch of its Vulnerability & Patch Advisory (VPA) service, a new addition to NETSEC's suite of Intelligence services.

Full browser ?