Vulnerabilities definition

Vulnerabilities means a flaw, weakness, bug, possible shortcoming or faulty implementation.
Vulnerabilities in the plural) shall mean: a flaw or weakness in computer system functionality, design, implementation, internal controls, or security procedures that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy.
Vulnerabilities means weaknesses in a computer, computer system or critical information infrastructure, information system, security procedures, internal controls or implementation that may be exploited to gain unauthorized access or that may be exploited or triggered by a threat source.

Examples of Vulnerabilities in a sentence

  • Grantee agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up to date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) Grantee agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules.

  • While no software can be guaranteed to be free from Security Vulnerabilities, if a Security Vulnerability is discovered, Motorola will take the steps set forth in Section 6 of this Agreement.

  • Motorola uses reasonable means in the design and writing of its own Software and the acquisition of third party Software to limit Security Vulnerabilities.

  • Motorola does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.

  • Subrecipient agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up to date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) Subrecipient agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules.

  • These efforts will involve either replacing the media or attempting to correct significant, demonstrable program or documentation errors or Security Vulnerabilities.

  • The Contractor agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up-to-date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) The Contractor agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules.

  • Vulnerabilities identified and rated as high risk by Convercent will be remediated within ninety (90) days of discovery.

  • Vulnerabilities are remediated on a risk basis, with Critical, High and Medium security patches for all components installed as soon as commercially possible.

  • Vulnerabilities will be reported to the Supplier for remediation.


More Definitions of Vulnerabilities

Vulnerabilities. The OPSEC Plan shall contain vulnerabilities derived by comparing threat to sensitive activities to determine which sensitive activities can be observed by FIS. "Observe" is defined to include all physical and chemicalproperties that can be noted and recorded by any type of sensor to includeTEMPEST concerns. The instructions in the Industrial OPSEC Guide shall be followed to identify potential TEMPEST vulnerabilities.
Vulnerabilities means any weakness or shortfall from industry standards that can be exploited in case of a threat action/attack and/or to perform unauthorized actions within a network or computer system, Software or Data. Warranty Period Shall have the meaning as given in clause 13.1. WeRide Shall have the meaning as given in preamble. WeRide Background IP Shall mean all IP developed, owned or used by WeRide and its Affiliates, as necessary to use the Bosch Foreground IP, in connection with the SW Modules for Automated Driving Business, which will be used in the Project. For the avoidance of doubt, WeRide Background IP includes third party IP as provided under clause 3.7.
Vulnerabilities a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to confidentiality, integrity, or availability, and the term Vulnerabilities shall be construed accordingly.
Vulnerabilities means a type of weakness in a computer system, in a set of procedures, or in anything that leaves information security exposed to a threat.

Related to Vulnerabilities

  • Vulnerability means a weakness of an asset or mitigation that can be exploited by one or more threats.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Vulnerable means a condition in which an adult is unable to protect himself or herself from abuse, neglect, or exploitation because of a mental or physical impairment or because of advanced age.

  • Vulnerable adult means any person 18 years of age or older who: (1) is a resident or inpatient of a facility; (2) receives services required to be licensed under Minnesota Statutes chapter 245A, except as excluded under Minnesota Statutes section 626.5572, Subd. 21(a)(2); (3) receives services from a licensed home care provider or person or organization that offers, provides, or arranges for personal care assistance services under the medical assistance program; or (4) regardless of residence or whether any type of service is received, possesses a physical or mental infirmity or other physical, mental, or emotional dysfunction that impairs the individual’s ability to provide adequately for the individual’s own care without assistance or supervision and, because of the dysfunction or infirmity and need for care or services, has an impaired ability to protect the individual’s self from maltreatment.

  • Severity means the dollar amount of losses on claims.