Also found in: Dictionary, Thesaurus, Medical, Acronyms, Wikipedia.


(computer science)
A weakness in a computing system that can result in harm to the system or its operations, especially when this weakness is exploited by a hostile person or organization or when it is present in conjunction with particular events or circumstances.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.


Vulgarity (See COARSENESS.)
warrior vulnerable only in his heel. [Gk. Myth.: Zimmerman, 4]
only vulnerable if not touching ground. [Gk. and Rom. Myth.: Hall, 151]
conquerable only with mistletoe. [Norse Myth.: Walsh Classical, 43]
Irish Achilles, killed through cunning Fionn’s deceit. [Irish Myth.: Jobes, 443; Parrinder, 79]
Maginot Line
French fortification zone along German border; thought impregnable before WWII. [Fr. Hist.: NCE, 1658]
strength derived from his hair; betrayed by Delilah. [O.T.: Judges 16]
vulnerable in only one spot on his back. [Ger. Opera: Wagner, Götterdämmerung, Westerman, 245]
Siegfried Line
German fortification zone opposite the Maginot Line between Germany and France. [Ger. Hist.: WB, 17: 370]
invulnerable except for Kryptonite. [TV: “The Adventures of Superman” in Terrace, I, 38; Comics: Horn, 642]
Allusions—Cultural, Literary, Biblical, and Historical: A Thematic Dictionary. Copyright 2008 The Gale Group, Inc. All rights reserved.


A security exposure in an operating system or other system software or application software component. Before the Internet became mainstream and exposed every organization in the world to every attacker on the planet, vulnerabilities surely existed, but were not as often exploited.

In light of this madness, mostly perpetrated against Microsoft products, the architecture of future operating systems has changed. Designing software to be bulletproof against attacks is like building a house where every square inch is fortified with steel and sensors that detect intrusions. Patching an existing operating system written by hundreds of programmers who were not dwelling on this issue when they wrote the code is an onerous job.

Security firms maintain databases of vulnerabilities based on version number of the software. If exploited, each vulnerability can potentially compromise the system or network. To search for vulnerabilities and exposures in the National Vulnerability Database (NVD), visit See network security scanner and vulnerability disclosure.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Vulnerability starts with the decision to have a child or when a pregnancy occurs, and continues till the child is two years old.
For more information about the vulnerability, read the Tenable Research blog post on Medium.
"An attacker who successfully exploited the vulnerability could gain the same user rights as the current user," Microsoft added.
So how far will these self-other differences in our perceptions of vulnerability extend.
Human vulnerability analysis is a mode of studying law and institutions.
An Online Trust Alliance report recommended regular patching and special attention to vulnerability as a best practice.
HANA.EXPERT offers the Healthcare Industry a sophisticated, enterprise-grade vulnerability scanning and management assessments that gives clients control and manage of IT security risks.
The kind of vulnerability which lives in the hardcore engineering cyber world appears in many flavors:
This study aims to analyze vulnerability assessment of some key Ministries, Departments and Agencies (MDA's) websites in Nigeria.
To achieve this, the Trump administration should direct intelligence agencies to responsibly disclose every vulnerability they discover."
4 -- Tenable Network Security(R), Inc., a global leader in cybersecurity, today makes available the industry's first cloud-based vulnerability management platform to secure the full range of assets in the modern elastic IT environment.
Software developers use web vulnerability scanners to automate the process of examining the security of their web-based applications and conduct large-scale security analyses on many different web applications [5].

Full browser ?