{"json_modified": "2016-03-28T08:44:05.105741", "uuid": "27c933d5-9f4d-406b-b635-3f7c429e6a81", "title": "Vulnerabilities", "url": "/en-US/docs/Web/Security/Information_Security_Basics/Vulnerabilities", "tags": ["Security", "Beginner", "Tutorial"], "translations": [{"uuid": "848b17cb-36ae-4ccb-a1aa-c4ed7a5178a1", "title": "Les vuln\u00e9rabilit\u00e9s", "url": "/fr/docs/Apprendre/Les_vuln%C3%A9rabilit%C3%A9s", "tags": ["Security", "Beginner", "Learn"], "summary": "Une vuln\u00e9rabilit\u00e9 est une faiblesse d'un syst\u00e8me qui peut \u00eatre exploit\u00e9e de fa\u00e7on n\u00e9gative pour compromettre la confidentialit\u00e9, l'int\u00e9grit\u00e9 ou la disponibilit\u00e9 d'un syst\u00e8me et/ou de des donn\u00e9es. Il existe de nombreuses m\u00e9thodes pour cat\u00e9goriser les vuln\u00e9rabilit\u00e9s. Dans cet article, nous les classerons dans trois grands groupes : les erreurs logicielles, les erreurs de configuration des syst\u00e8mes de s\u00e9curit\u00e9 et la mauvaise utilisation d'une fonctionnalit\u00e9 d'un logiciel. Ces cat\u00e9gories sont d\u00e9crites ci-apr\u00e8s.", "localization_tags": [], "locale": "fr", "last_edit": "2015-09-27T05:30:19", "review_tags": []}, {"uuid": "4f8afd3c-2d4a-4f38-9d65-063d89f8d031", "title": "Vulnerabilit\u00e0", "url": "/it/docs/Learn/Vulnerabilit%C3%A0", "tags": [], "summary": "Una vulnerabilit\u00e0 \u00e8 una debolezza in un sistema che pi\u00f9 essere sfruttata per compromettere riservatezza, integrit\u00e0 e/o disponibilit\u00e0. Le vulnerabilit\u00e0 possono essere catalogate in molti modi diversi. Questo articolo usa tre categorie di vulnerabilit\u00e0 di alto-livello: difetto software, problemi di configurazione di sicurezza e cattivo impiego di funzioni software. Tali categorie vengono descritte di seguito.", "localization_tags": ["inprogress"], "locale": "it", "last_edit": "2015-12-18T07:28:00", "review_tags": []}], "modified": "2016-03-02T10:51:31", "label": "Vulnerabilities", "localization_tags": [], "locale": "en-US", "id": 145729, "last_edit": "2016-03-02T10:49:54", "summary": "A vulnerability is a weakness in a system that can be exploited to negatively impact confidentiality, integrity, and/or availability. There are many ways in which vulnerabilities can be categorized. This article uses three high-level vulnerability categories: software flaws, security configuration issues, and software feature misuse. These categories are described below.", "sections": [{"id": "Vulnerability_Categories", "title": "Vulnerability Categories"}, {"id": "The_Presence_of_Vulnerabilities", "title": "The Presence of Vulnerabilities"}, {"id": "Original_Document_Information", "title": "Original Document Information"}], "slug": "Web/Security/Information_Security_Basics/Vulnerabilities", "review_tags": []}