actively exploited vulnerability definition

actively exploited vulnerability means a vulnerability for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner;
actively exploited vulnerability means a vulnerability for which there is reliable evidence that a malicious ▌actor has exploited it in a system without permission of the system owner;
actively exploited vulnerability means a vulnerability as defined in Article 6, point (15), of Directive (EU) 2022/2555 for which there is reliable evidence that execution of a malicious actor has code was performed by an actor on attempted to exploit it in a system without permission of the system owner, irrespective of whether this attempt has been successful or not;

More Definitions of actively exploited vulnerability

actively exploited vulnerability means a vulnerability for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner; but does not include a vulnerability for which there is reliable evidence that the exploitation was performed by an actor for purposes of good faith testing, investigation, correction, or disclosure of a security flaw or vulnerability to promote the security or safety of the system owner, computers or software, or those who use such computers or software;

Related to actively exploited vulnerability

  • Massive Multiauthor Collaboration Site (or “MMC Site”) means any World Wide Web server that publishes copyrightable works and also provides prominent facilities for anybody to edit those works. A public wiki that anybody can edit is an example of such a server. A “Massive Multiauthor Collaboration” (or “MMC”) contained in the site means any set of copyrightable works thus published on the MMC site.

  • Dark pattern means a user interface designed or manipulated with the substantial effect of subverting or impairing user autonomy, decision- making, or choice and includes any practice the Federal Trade Commission refers to as a “dark pattern.”

  • Dusting aid means a product designed or labeled to assist in removing dust and other soils from floors and other surfaces without leaving a wax or silicone based coating. “Dusting Aid” does not include “Pressurized Gas Duster.”

  • Common Channel Signaling (CCS) means an out-of-band, packet-switched, signaling network used to transport supervision signals, control signals, and data messages. It is a special network, fully separate from the transmission path of the public switched network. Unless otherwise agreed by the Parties, the CCS protocol used by the Parties shall be SS7.

  • Sexual exploitation means any actual or attempted abuse of a position of vulnerability, differential power, or trust for sexual purposes. It includes profiting monetarily, socially, or politically from sexual exploitation of another.