vulnerabiliti
Vulnerabiliti, commonly referred to as vulnerabilities in information security, are weaknesses in a system, product, or process that can be exploited to breach confidentiality, integrity, or availability. In cybersecurity terms, a vulnerability is distinct from an attack and from an exploit: a flaw exists, an attacker may take advantage of it, and a remediation may close it.
Vulnerabilities can appear in software code, hardware design, configurations, or human and organizational processes. Software vulnerabilities
Discovery and assessment involve automated scanners, manual testing, fuzzing, and code reviews to identify weaknesses. When
Management of vulnerabilities focuses on prioritization, patching, and hardening. Organizations apply software and firmware updates, reconfigure
Disclosure and response are guided by responsible disclosure practices. Vendors, researchers, and CERT/CSIRT teams coordinate to
Supply-chain vulnerabilities affect components from multiple vendors. Practices such as maintaining an up-to-date software bill of
Notable examples include Heartbleed (OpenSSL, CVE-2014-0160) and EternalBlue (MS17-010), illustrating the potential impact of unpatched flaws.