Cybersecurity Reference > Glossary
What is a Vulnerability?
These flaws show up everywhere—in the code developers write, the way systems are configured, the policies organizations follow, and even in how people behave. A database with a default password is vulnerable. So is a web application that doesn't validate user input, or an employee who clicks suspicious links.
Vulnerabilities matter because they're the entry points attackers look for. Some are obvious and well-documented, like unpatched software with known flaws. Others hide in obscure combinations of settings or in the gaps between systems that don't quite talk to each other correctly. Hardware can have vulnerabilities too, whether from design flaws or physical access issues.
The concept of an attack surface captures where these vulnerabilities cluster—the interfaces, services, and access points that face potential threats. Finding and fixing vulnerabilities before attackers do is fundamental to security work, though it's a race that never quite ends.
Origin
Through the 1990s, as commercial software proliferated, so did the catalog of known flaws. Organizations started tracking vulnerabilities systematically, leading to the Common Vulnerabilities and Exposures (CVE) system in 1999, which gave each discovered vulnerability a unique identifier.
The thinking evolved from seeing vulnerabilities as isolated bugs to understanding them as inevitable byproducts of complex systems. Modern vulnerability research considers not just technical flaws but also how systems interact, how humans use them, and how attackers chain multiple small weaknesses together. What began as academic curiosity became an entire industry of discovery, disclosure, and remediation.
Why It Matters
The sheer volume makes this daunting. A typical enterprise application might contain hundreds of dependencies, each potentially harboring flaws. Cloud environments add layers of complexity where misconfigurations create new vulnerability classes. Supply chain attacks exploit vulnerabilities in trusted software that propagates widely. Zero-day vulnerabilities—flaws unknown to vendors—command high prices and enable sophisticated attacks. Even after patches exist, many organizations struggle to apply them quickly across sprawling environments.
The vulnerabilities that matter most aren't always the most technically severe; they're the ones attackers can actually reach and exploit in your specific environment. Understanding your real vulnerability exposure means knowing your systems, your attack surface, and what adversaries find valuable.
The Plurilock Advantage
We combine automated discovery with manual testing by practitioners who think like adversaries. Our team includes former intelligence professionals who understand how real attackers chain vulnerabilities together and prioritize targets.
We help organizations move beyond checkbox compliance to genuine risk reduction, identifying not just individual flaws but the architectural weaknesses and misconfigurations that create systemic exposure. When you need vulnerabilities found and fixed, not just documented, we deliver.
.




