This great structureleadsto vulnerability of system
to exploit(passive) was designedthe system vulnerability
terms of characteristicscontributeto a system s vulnerability
something majorcausingsystem vulnerability
that insecure insecure software be employedcausingvulnerability to the system
bugscausea system vulnerability
a relatively small number of componentscontributeto system vulnerability
The syslog protocol ... very likelyto leadto a system vulnerability
IoTcan causesystem vulnerability
This lack of knowledge of other child processesleadsto system vulnerability
The infection of this virusresultsin system vulnerability
Poor design and configurationleadto vulnerability of the system
improper verification of bitcoins(passive) is discoveredVulnerability in the system
an adversarydiscoversa system vulnerability
data availableanywhere at any moment causessystem vulnerability
unintentional oversightsmight ... causevulnerability to the system
all versions of FreeBSD ... 2.2-CURRENTcauseda system vulnerability
A bug was found in the vfsload(3 ) library call that affects all versions of FreeBSD from 2.0 through 2.2-CURRENTcauseda system vulnerability
that affects all versions of FreeBSD from 2.0 through 2.2-CURRENTcauseda system vulnerability
to a breach of financial or corporate serversleadsto a breach of financial or corporate servers
to breach of financial or corporate serversleadsto breach of financial or corporate servers
to exploitationcould leadto exploitation
a data breach involving personal consumer informationcausesa data breach involving personal consumer information
the disclosure of ... Page(scould causethe disclosure of ... Page(s
the disclosure ofcould causethe disclosure of
users to leak outwould causeusers to leak out
to proper discussion by the vendor as well asledto proper discussion by the vendor as well as
in an undesirable consequence resultsin an undesirable consequence
in an undesirable consequenceresultsin an undesirable consequence
harm to the company or the employees ( sourcecould causeharm to the company or the employees ( source
in a breach Threatcould resultin a breach Threat
in the loss of customer confidencewould resultin the loss of customer confidence
system compromise(passive) caused bysystem compromise
to full compromise of the servercan leadto full compromise of the server
in better securityresultsin better security
in improved securityresultsin improved security
to improved securityleadsto improved security
a vulnerability on a perimeter serverdiscoversa vulnerability on a perimeter server
The problem(passive) is caused byThe problem
in a loss of sensitive dataresultsin a loss of sensitive data
a potential danger(passive) caused bya potential danger
a possible danger(passive) caused bya possible danger
to corruptionmight leadto corruption
the harm of viruses(passive) resulted bythe harm of viruses
in superior securityresultsin superior security
viruses(passive) resulted byviruses
a lot of fraud and cashresultsa lot of fraud and cash
in quicker fixes and better securityresultsin quicker fixes and better security
security breach(passive) caused bysecurity breach
a lot of fraud and cash losingresultsa lot of fraud and cash losing
to damage posed to property and human lifemay also leadto damage posed to property and human life
the risks(passive) caused bythe risks
to attacksleadsto attacks
it to suffer a definite degradation ( loss or reduction of capability to perform its designated missioncausesit to suffer a definite degradation ( loss or reduction of capability to perform its designated mission
from existing sourcesoriginatingfrom existing sources
or protect their own hacking capabilitiesdiscoveror protect their own hacking capabilities
that ... protect their own hacking capabilitiesdiscoverthat ... protect their own hacking capabilities
that ... or protect their own hacking capabilitiesdiscoverthat ... or protect their own hacking capabilities
a privilege escalation on the platform from unprivileged to admincausea privilege escalation on the platform from unprivileged to admin