Technical vulnerability information: Details about a weakness or flaw in a system or application that can be exploited by an attacker. It is used by security professionals to identify and mitigate risks and by software developers to fix vulnerabilities. Examples include information about a buffer overflow exploit in a web application or a SQL injection attack on a database.
Categories: CC D5: Security Operations | CCSP D5: Cloud Security Operations | CISM D3: Information Security Program | CISSP D1: Security and Risk Management | Security+ D3: Security Architecture | SSCP D3: Risk Identification Monitoring and Analysis
« Back to Glossary Index