Also found in: Dictionary, Thesaurus, Medical, Acronyms, Wikipedia.


(computer science)
A weakness in a computing system that can result in harm to the system or its operations, especially when this weakness is exploited by a hostile person or organization or when it is present in conjunction with particular events or circumstances.


Vulgarity (See COARSENESS.)
warrior vulnerable only in his heel. [Gk. Myth.: Zimmerman, 4]
only vulnerable if not touching ground. [Gk. and Rom. Myth.: Hall, 151]
conquerable only with mistletoe. [Norse Myth.: Walsh Classical, 43]
Irish Achilles, killed through cunning Fionn’s deceit. [Irish Myth.: Jobes, 443; Parrinder, 79]
Maginot Line
French fortification zone along German border; thought impregnable before WWII. [Fr. Hist.: NCE, 1658]
strength derived from his hair; betrayed by Delilah. [O.T.: Judges 16]
vulnerable in only one spot on his back. [Ger. Opera: Wagner, Götterdämmerung, Westerman, 245]
Siegfried Line
German fortification zone opposite the Maginot Line between Germany and France. [Ger. Hist.: WB, 17: 370]
invulnerable except for Kryptonite. [TV: “The Adventures of Superman” in Terrace, I, 38; Comics: Horn, 642]


A security exposure in an operating system or other system software or application software component. Before the Internet became mainstream and exposed every organization in the world to every attacker on the planet, vulnerabilities surely existed, but were not as often exploited.

In light of this madness, mostly perpetrated against Microsoft products, the architecture of future operating systems has changed. Designing software to be bulletproof against attacks is like building a house where every square inch is fortified with steel and sensors that detect intrusions. Patching an existing operating system written by hundreds of programmers who were not dwelling on this issue when they wrote the code is an onerous job.

Security firms maintain databases of vulnerabilities based on version number of the software. If exploited, each vulnerability can potentially compromise the system or network. To search for vulnerabilities and exposures in the National Vulnerability Database (NVD), visit See network security scanner and vulnerability disclosure.
References in periodicals archive ?
Vulnerability starts with the decision to have a child or when a pregnancy occurs, and continues till the child is two years old.
For more information about the vulnerability, read the Tenable Research blog post on Medium.
"An attacker who successfully exploited the vulnerability could gain the same user rights as the current user," Microsoft added.
So how far will these self-other differences in our perceptions of vulnerability extend.
Human vulnerability analysis is a mode of studying law and institutions.
An Online Trust Alliance report recommended regular patching and special attention to vulnerability as a best practice.
HANA.EXPERT offers the Healthcare Industry a sophisticated, enterprise-grade vulnerability scanning and management assessments that gives clients control and manage of IT security risks.
The kind of vulnerability which lives in the hardcore engineering cyber world appears in many flavors:
This study aims to analyze vulnerability assessment of some key Ministries, Departments and Agencies (MDA's) websites in Nigeria.
To achieve this, the Trump administration should direct intelligence agencies to responsibly disclose every vulnerability they discover."
4 -- Tenable Network Security(R), Inc., a global leader in cybersecurity, today makes available the industry's first cloud-based vulnerability management platform to secure the full range of assets in the modern elastic IT environment.
Software developers use web vulnerability scanners to automate the process of examining the security of their web-based applications and conduct large-scale security analyses on many different web applications [5].

Full browser ?