O'Reilly logo

Joomla! Web Security: Secure your Joomla! Website from Common Security Threats with this easy-to-use Guide by Tom Canavan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

What is a Vulnerability?

We turn to Wikipedia for the definition of “Vulnerability”:

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus, a script code injection, a SQL injection, a Blue Pill, or malware. A vulnerability may exist only in theory, or may have a known instance of an exploit.

A construct in a computer language is said to be a vulnerability, when many program faults can have their root cause traced to its use.

You may be inwardly asking yourself, “Why do weaknesses in the system happen? Can’t these programmers just do a better job?” Your question is fair. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required