Jump to content

Search results

Did you mean: vulnerable
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Look up vulnerable in Wiktionary, the free dictionary. Vulnerable may refer to: Vulnerability Vulnerability (computing) Vulnerable adult Vulnerable species...
    1 KB (162 words) - 06:00, 12 March 2023
  • Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The...
    25 KB (3,188 words) - 18:30, 23 May 2025
  • Thumbnail for Vulnerable species
    A vulnerable species is a species which has been categorized by the International Union for Conservation of Nature as being threatened with extinction...
    7 KB (746 words) - 04:18, 20 June 2025
  • A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. These scanners are used to...
    5 KB (639 words) - 13:40, 24 May 2025
  • Vulnerabilities are flaws or weaknesses in a system's design, implementation, or management that can be exploited by a malicious actor to compromise its...
    27 KB (3,333 words) - 03:19, 9 June 2025
  • A cognitive vulnerability in cognitive psychology is an erroneous belief, cognitive bias, or pattern of thought that predisposes an individual to psychological...
    10 KB (1,151 words) - 20:39, 1 March 2024
  • is a vulnerability or security hole in a computer system unknown to its developers or anyone capable of mitigating it. Until the vulnerability is remedied...
    25 KB (3,047 words) - 08:00, 17 June 2025
  • A vulnerability index is a measure of the exposure of a population to some hazard. Typically, the index is a composite of multiple quantitative indicators...
    11 KB (1,192 words) - 17:09, 28 May 2025
  • Structural vulnerability is a distinct likelihood of encountering major difficulties within the family atmosphere or the threat to the family itself because...
    2 KB (292 words) - 10:09, 5 April 2024
  • Thumbnail for JavaScript
    prevent XSS. XSS vulnerabilities can also occur because of implementation mistakes by browser authors. Another cross-site vulnerability is cross-site request...
    84 KB (7,900 words) - 22:09, 11 June 2025
  • Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating" software vulnerabilities. Vulnerability...
    6 KB (573 words) - 11:38, 11 May 2025
  • Addiction vulnerability is an individual's risk of developing an addiction during their lifetime. There are a range of genetic and environmental risk...
    23 KB (3,030 words) - 14:13, 26 May 2025
  • A vulnerable adult, sometimes called an incapacitated adult, is an adult who, due to mental or bodily disability, cannot take care of themselves without...
    12 KB (1,252 words) - 19:52, 25 May 2025
  • The Common Vulnerabilities and Exposures (CVE) system, originally Common Vulnerability Enumeration, provides a reference method for publicly known information-security...
    17 KB (2,102 words) - 00:33, 26 May 2025
  • A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems...
    9 KB (1,198 words) - 04:13, 6 January 2025
  • Register, the following CPU families are vulnerable: Alder Lake, Raptor Lake and Sapphire Rapids. The Reptar vulnerability relates to processing of x86 instruction...
    3 KB (229 words) - 13:31, 20 March 2024
  • about discovered computer security vulnerabilities. The database will customarily describe the identified vulnerability, assess the potential impact on affected...
    17 KB (1,831 words) - 13:37, 4 November 2024
  • In its broadest sense, social vulnerability is one dimension of vulnerability to multiple stressors and shocks, including abuse, social exclusion and...
    44 KB (5,127 words) - 03:30, 19 May 2025
  • Thumbnail for Sigrid Nunez
    Kind, The Friend, What Are You Going Through, and, most recently, The Vulnerables. She is also the author of Sempre Susan: A Memoir of Susan Sontag. Among...
    24 KB (2,203 words) - 05:53, 6 April 2025
  • In August 2019, computer experts reported that the BlueKeep security vulnerability, CVE-2019-0708, that potentially affects older unpatched Windows versions...
    104 KB (9,210 words) - 05:35, 1 June 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)