Trending Vulnerability Discussions

Follow

Ask the Community


Ask any professional question and get answers from other specialists.

Stream language
Abdulaziz Alharbi's image
Question added by Abdulaziz Alharbi IT Security Specialist Sentient Vision System & RMIT
9 years ago
Answers:
29
Followers:
Views:
354
Vote Count:
0
Answer should contain a minimum of 25 characters.
BIPLAB KUMAR ROY's image
Question added by BIPLAB KUMAR ROY Information Security Engineer Hudson'S Bay Services Pvt. Ltd
7 years ago
Answers:
0
Followers:
Views:
1
Vote Count:
0
Answer should contain a minimum of 25 characters.
krishna sannidhi's image
Question added by krishna sannidhi Scrum Master Phenom People
8 years ago
Answers:
0
Followers:
Views:
18
Vote Count:
0
Answer should contain a minimum of 25 characters.
Abdulaziz Alharbi's image  
Answer added by  Abdulaziz Alharbi, IT Security Specialist, Sentient Vision System & RMIT
9 years ago

A vulnerability is a flaw in a system, or part of the system, that could provide an attacker with a way to bypass the security infrastructure of the host operating system ... See More

Romi Syuhada's image  
Answer added by  Romi Syuhada, senior security consultant, Xtremax Pte Ltd
2 years ago

there is no guarantee that the vulnerability has an exploit as POC, but if an exploit exist, there is a vulnerability or more that is used to gain the action intended 

Kassem Al Khatib's image  
Answer added by  Kassem Al Khatib, IT Manager / ERP, Al Brooge Securities
9 years ago

hiii, you can exploit the vulnerability of system to attack/hack it

ADEYEMI Ademiluyi's image  
Answer added by  ADEYEMI Ademiluyi, Information & Cyber Security (Consultant), intelPRO
7 years ago

Vulnerability is the weakness of a system or network while exploit is the program or codes use for exploiting the weaknesses of the system

Default profile image  
Answer added by  anwar lord , Cyber Security Expert
7 years ago

vulnerability=security loophole in a system exploit=hacking a system using a vulnerability

Muhammad Umair Ahmad's image  
Answer added by  Muhammad Umair Ahmad, Virtualzation Lead, Dell Technologies
7 years ago

A vulenerabitlity is a threat in a network / application which can breach the security for an attacker while exploit is that attack which is generated / created due to th ... See More

Default profile image  
Answer added by  Deleted user
7 years ago

Vulnerability is a flaw in a system, or in some software in a system. But Exploiting is the act of trying to turn a Vulnerability into an actual way to breach a system.