Hardware, firmware, or software flow that leaves an AIS open for potential exploitation. A weakness in automated system security procedures, administrative controls, physical layout, internal controls, and so forth, that could be exploited by a threat to gain unauthorized access to information or disrupt critical processing.
the susceptibility of the population and environment to the nature of an event; the susceptibility of an individual or population to injury or contagion;153 the degree of possible/potential loss to a given element at risk resulting from a given hazard at a given intensity.154 Return to Top of List
A weakness that could be exploited to cause damage to the system or the assets it contains.
susceptibility to injury or attack
a characteristic of a piece of technology which can be exploited to perpetrate a security incident
a condition or weakness in (or absence of) security procedures, technical controls, physical controls, or other controls that could be exploited by a threat
a condition that enables someone (the attacker ) to violate the security policy
a feature or bug in a system or program which enables an attacker to bypass security measures
a flaw in program code, caused by human error (predominately)
a flaw in software code which might be exploited to perform attacks on the networks or computers which use that software
a flaw or weakness in the design or implementation of hardware, software, networks, or computer-based systems, including security procedures and controls associated with the systems
an area in which an attack, if made, is likely to be successful
an aspect of a system or protocol that may be exploited to use the system in a protocol in a manner other than it was designed for
an error or weakness in a component that allows it to be attacked, resulting in unauthorized use of the item or in damage to it and components connected to it
an exploitable capability or an exploitable security weakness or deficiency
a point of weakness as far as security is concerned in an application
a security flaw in a program
a software bug that needs to be repaired to avoid a security issue
a software flaw in a computing system that could be exploited by malicious code to gain unauthorized access to information or process
a software, hardware, or organizational weakness that may allow unauthorized access
a theoretical value describing a flaw or a weak point in a System (Asset)
a threat that actually exists for a given information asset
a weakness due to hardware or software shortcomings
a weakness in an asset that could lead to exploitation
a weakness in an asset which could lead to exploitation
a weakness in a system or object that may cause harm
a weakness in a system that might allow a threat to become realized
a weakness in some aspect or feature of a system that makes an exploit possible
a weakness that allows a threat to be manifested
a weakness that a person can exploit to accomplish something that is not authorized or intended as legitimate use of a network or system
a weakness that can be accidentally triggered or intentionally exploited
a weakness that can be exploited by a threat
a weakness that could be exploited to violate a system or it's information
a weakness which a threat will exploit to attack the assets
A weakness in automated system security procedures, technical controls, environmental controls, administrative controls, internal controls, etc., that could be used as an entry point to gain unauthorized access to information or disrupt critical processing.
a flaw in a computer or network allowing unauthorized use or unauthorized access
Condition or weakness that could lead to exposure to the public, unnecessary or increased exposure to workers, or release of radioactive materials to the environment.
An exploitable capability or an exploitable security weakness at an infrastructure, organisation or location. A vulnerability exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
A flaw or weakness in a system's design, implementation, or operation that can be exploited by an intruder to violate the system's security policy.
a security flaw or weakness that could allow an attacker to compromise or exploit a system's operation.
A feature or combination of features of a system that allows an adversary, the intruder, to place the system, your computer, in a state that is both contrary to the desires of the people responsible for the system and increases the risk (probability or consequence) of undesirable behavior in or of the system. A feature or combination of features of a system that prevents the successful implementation of a particular security policy for that system. A program with a buffer that can be overflowed with data supplied by the invoker will usually be considered a vulnerability. A telephone procedure that provides private information about the caller without prior authentication will usually be considered to have a vulnerability.
any characteristic of a computer system that keeps it from operating correctly, or that will let unauthorized users take control of the system
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited.
A weakness, or finding that is noncompliant, non-adherence to a requirement, a specification or a standard, or unprotected area of an otherwise secure system, which leaves the system open to potential attack or other problem.
a weakness in security procedures that may be used to violate a system security policy.
Software errors that allow some kind of unauthorized access when they are used or exploited. Typically, a software bug or misconfiguration which affects the operation of an operating system or other program run on a computer allowing it to be more easily accessed. Hackers, worms, viruses, and trojans use vulnerabilities to gain access to computer systems without the user's knowledge.
Refers to any weakness in any system (either hardware or software) that allows intruders to gain unauthorized access or deny service.
A set of prevailing or consequential conditions composed of physical, geographic, demographic, socio-economic and/or political factors which increase a community's susceptibility to calamity, or which adversely affects its ability to respond to events.
The susceptibility of information to exploitation by an adversary.
a flaw or weakness that may allow harm to occur to an automated information system or activity.
A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy.
A flaw or weakness in the design, implementation, or operation and management of an information system.
A weakness of the system and its assets, which could be exploited by threats.
Any product flaw, administrative process or act, or physical exposure that makes a computer susceptible to attack by a malicious user.
an inadequacy related to security that could permit a threat to cause injury. [GSP
Any weakness, administrative process or act, or physical exposure that makes a computer susceptible to exploit by a threat.
A weakness in security procedures, network design, or implementation, that can be exploited to violate a corporate security policy.
Describes how exposed or susceptible to damage an asset is. Vulnerability depends on an asset's construction, contents, and the economic value of its functions. Like indirect damages, the vulnerability of one element of the community is often related to the vulnerability of another. For example, many businesses depend on uninterrupted electrical power - if an electric substation is flooded, it will affect not only the substation itself, but a number of businesses as well. Often, indirect effects can be much more widespread and damaging than direct ones.
Exploitable defect in a software application or operating system, allowing others to crash systems, access information on systems, or use systems for their own purposes.
Vulnerabilities open security holes that can allow other applications to connect to the computer system without your authorization or knowledge.
An error in a software's design or implementation, or a failure in a software's operation that can be used for breaking security or otherwise attacking a computer (usually over a network). In other words, a bug that a cracker can take advantage of.
A Vulnerability is a flaw or weakness in a system that can be exploited and result in a system compromise.
The ability of a system to be exploited.
Flaws or security holes in a program or IT system, and often used by viruses as a means of infection. Isuy View Public Profile Find all posts by Isuy # 23 09-20-2006, 07:22 PM Isuy Registered Member Join Date: Jul 2006 Location: Saitama-Ken Posts: 134
A vulnerability is the existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system, network, application, or protocol involved.
Security holes/bugs are faults, defects or programming errors. These may be exploited by unauthorised users to access computer networks or web servers from the Internet. As these vulnerabilities become known, software publishers develop patches', fixes' or updates' that you can download to fix the problems. For more information visit our Updating your computer section.
Vulnerability is a characteristic (including a weakness) of an information asset or group of information assets, which can be exploited by a threat.
The susceptibility of a population to a specific type of event. Vulnerability is also associated with the degree of possible or potential loss from a risk that results from a hazard at a given intensity. The factors that influence vulnerability include demographics, the age and resilience of the environment, technology, social differentiation and diversity, as well as regional and global economics and politics. An exploitable capability; an exploitable security weakness or deficiency at a facility, entity, venue, or that of a person.