Vulnerability
Contents
- 1 CNSSI 4009
- 2 FIPS 200
- 3 NIST SP 800-114
- 4 NIST SP 800-16
- 5 NIST SP 800-18r1
- 6 NIST SP 800-26
- 7 NIST SP 800-27rA
- 8 NIST SP 800-28v2
- 9 NIST SP 800-30
- 10 NIST SP 800-33
- 11 NIST SP 800-37
- 12 NIST SP 800-40
- 13 NIST SP 800-44
- 14 NIST SP 800-44v2
- 15 NIST SP 800-45
- 16 NIST SP 800-47
- 17 NIST SP 800-53AdF
- 18 NIST SP 800-53r1
- 19 NIST SP 800-53r2
- 20 NIST SP 800-61
- 21 NIST SP 800-61r1
- 22 NIST SP 800-66
- 23 NIST SP 800-69
CNSSI 4009
Weakness in an IS, system security procedures, internal controls, or implementation that could be exploited.
FIPS 200
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. (CNSS Instruction 4009 Adapted)
NIST SP 800-114
A security weakness in a computer.
NIST SP 800-16
A flaw or weakness that may allow harm to occur to an IT system or activity.
NIST SP 800-18r1
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. (CNSS Inst. 4009, Adapted)
NIST SP 800-26
Vulnerability is a flaw or weakness that may allow harm to occur to an IT system or activity.
NIST SP 800-27rA
A weakness in system security requirements, design, implementation, or operation, that could be accidentally triggered or intentionally exploited and result in a violation of the system's security policy.
NIST SP 800-28v2
A flaw or weakness in a computer system, its security procedures, internal controls, or design and implementation, which could be exploited to violate the system security policy.
NIST SP 800-30
A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy.
NIST SP 800-33
A weakness in system security procedures, design, implementation, internal controls, etc., that could be accidentally triggered or intentionally exploited and result in a violation of the system's security policy.
NIST SP 800-37
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. (CNSS Inst. 4009, Adapted)
NIST SP 800-40
A flaw in the design or configuration of software that has security implications. A variety of organizations maintain publicly accessible databases of vulnerabilities.
NIST SP 800-44
A security exposure in an operating system or other system software or application software component. A variety of organizations maintain publicly accessible databases of vulnerabilities based on the version number of the software. Each vulnerability can potentially compromise the system or network if exploited.
NIST SP 800-44v2
A security exposure in an operating system or other system software or application software component. A variety of organizations maintain publicly accessible databases of vulnerabilities based on the version numbers of software. Each vulnerability can potentially compromise the system or network if exploited.
NIST SP 800-45
A security exposure in an operating system or other system software or application software component. A variety of organizations maintain publicly accessible databases of vulnerabilities based on the version numbers of software. Each vulnerability can potentially compromise the system or network if exploited.
NIST SP 800-47
A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy.
NIST SP 800-53AdF
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. [CNSS Inst. 4009, Adapted]
NIST SP 800-53r1
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
NIST SP 800-53r2
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. (CNSS Inst. 4009, Adapted)
NIST SP 800-61
A weakness in a system, application, or network that is subject to exploitation or misuse.
NIST SP 800-61r1
A weakness in a system, application, or network that is subject to exploitation or misuse.
NIST SP 800-66
A flaw or weakness in the design or implementation of an information system (including the security procedures and security controls associated with the system) that could be intentionally or unintentionally exploited to adversely affect an organization's operations or assets through a loss of confidentiality, integrity, or availability. (NIST SP 800-37)
NIST SP 800-69
A security weakness of a computer.
- CNSS
- CNSSI 4009 Terms
- NIACAP
- DIACAP
- FIPS 200 Terms
- NIST SP 800-114 Terms
- NIST SP 800-16 Terms
- NIST SP 800-18r1 Terms
- NIST SP 800-26 Terms
- NIST SP 800-27rA Terms
- NIST SP 800-28v2 Terms
- NIST SP 800-30 Terms
- NIST SP 800-33 Terms
- NIST SP 800-37 Terms
- NIST SP 800-40 Terms
- NIST SP 800-44 Terms
- NIST SP 800-44v2 Terms
- NIST SP 800-45 Terms
- NIST SP 800-47 Terms
- NIST SP 800-53AdF Terms
- NIST SP 800-53r1 Terms
- NIST SP 800-53r2 Terms
- NIST SP 800-61 Terms
- NIST SP 800-61r1 Terms
- NIST SP 800-66 Terms
- NIST SP 800-69 Terms
- Terms