Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Vulnerability

A weakness in a system, application, or process that can be exploited by a threat actor to perform unauthorized actions.

A vulnerability is a flaw or weakness in a system's design, implementation, configuration, or operational procedures that could be exploited to violate the system's security policy. Vulnerabilities exist in software code, network configurations, business logic, and even human processes. They range in severity from low-impact information disclosures to critical flaws that allow complete system compromise. The existence of a vulnerability does not necessarily mean it has been exploited, but it represents a potential avenue for attack.

How It Works

Vulnerabilities arise from many sources. Coding errors such as improper input validation lead to injection flaws. Design weaknesses create broken access control or insecure authentication mechanisms. Configuration mistakes leave default credentials active, expose sensitive endpoints, or enable unnecessary services. Business logic flaws allow users to manipulate application workflows in unintended ways, such as bypassing payment steps or modifying other users' data.

Each vulnerability has characteristics that determine its real-world risk. The attack vector describes how an attacker reaches the vulnerable component: remotely over the network, locally on the system, or through physical access. The attack complexity indicates how difficult exploitation is. The privileges required define whether the attacker needs authentication. The impact measures what the attacker gains: confidentiality breaches, data integrity violations, or service disruption. Scoring systems like CVSS formalize these factors into a numeric severity rating.

Vulnerabilities follow a lifecycle. They are introduced during development, may exist undetected for months or years, are eventually discovered through testing or exploitation, and are remediated through patches or configuration changes. The window between discovery and remediation represents the period of greatest risk, especially if the vulnerability becomes publicly known before a fix is available.

Why It Matters

Understanding what constitutes a vulnerability and how to assess its severity is the foundation of application security. Effective security testing is about finding vulnerabilities before attackers do, accurately communicating their risk, and providing clear remediation guidance. A single critical vulnerability can undermine an otherwise well-secured application, making thorough and systematic testing essential.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment