{"component": "definition", "props": {"groups": [{"size": 84, "snippet": "means a weakness of an asset or mitigation that can be exploited by one or more threats.", "samples": [{"hash": "d0XS2XkPb1E", "uri": "/contracts/d0XS2XkPb1E#vulnerability", "label": "Harmonized Technical Regulations Agreement", "score": 26.5852165222, "published": true}, {"hash": "6zoQKnCt83N", "uri": "/contracts/6zoQKnCt83N#vulnerability", "label": "Agreement Concerning the Adoption of Harmonized Technical United Nations Regulations for Wheeled Vehicles", "score": 26.5852165222, "published": true}, {"hash": "c6kkwD6FQSo", "uri": "/contracts/c6kkwD6FQSo#vulnerability", "label": "Agreement Concerning the Adoption of Harmonized Technical United Nations Regulations for Wheeled Vehicles", "score": 26.5838470459, "published": true}], "snippet_links": [], "hash": "de64048144f6f0ba2ccfae7e52994913", "id": 1}, {"size": 62, "snippet": "means a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to the confidentiality, integrity, or availability, and the term Vulnerabilities shall be construed accordingly.", "samples": [{"hash": "7KW4D37aXqc", "uri": "/contracts/7KW4D37aXqc#vulnerability", "label": "Terms of Service", "score": 36.0298995972, "published": true}, {"hash": "k9jctzklDpB", "uri": "/contracts/k9jctzklDpB#vulnerability", "label": "Client Agreement", "score": 35.7009086609, "published": true}, {"hash": "77KCJmSu4zw", "uri": "/contracts/77KCJmSu4zw#vulnerability", "label": "Terms of Service", "score": 34.9223518372, "published": true}], "snippet_links": [{"key": "for-example", "type": "clause", "offset": [45, 56]}, {"key": "hardware-components", "type": "definition", "offset": [86, 105]}, {"key": "negative-impact", "type": "definition", "offset": [140, 155]}, {"key": "the-term", "type": "definition", "offset": [212, 220]}], "hash": "451720423427c295ce3a1811960fcbcc", "id": 2}, {"size": 35, "snippet": "means a weakness, susceptibility or flaw of an asset, system, process or control that can be exploited by a threat;", "samples": [{"hash": "k60TJ6KRtb", "uri": "/contracts/k60TJ6KRtb#vulnerability", "label": "General Purchasing Conditions", "score": 35.5829353333, "published": true}, {"hash": "8R780Pv3EQi", "uri": "https://www.pfrda.org.in/writereaddata/links/circular%20-%20risk%20management%20framework%20for%20crasf7c9a8a2-83bb-4685-84c7-c91ee0acb331.pdf", "label": "www.pfrda.org.in", "score": 16.7689590454, "published": false}, {"hash": "14vxKz1WMU9", "uri": "https://www.franceinvest.eu/wp-content/uploads/2023/06/DORA-COM-PROPOSAL.pdf", "label": "www.franceinvest.eu", "score": 15.5156507492, "published": false}], "snippet_links": [], "hash": "9ab3653a86a14a56f0a4f75919daedd8", "id": 3}, {"size": 22, "snippet": "means the conditions determined by physical, social, economic and environmental factors or processes, which increase the susceptibility of a community to the impact of hazards.", "samples": [{"hash": "EtP1d5zjTR", "uri": "https://media.lawlibrary.org.za/files/legislation/akn-za-act-2002-57-eng-2016-05-01_1.pdf", "label": "media.lawlibrary.org.za", "score": 11.1505813599, "published": false}, {"hash": "cF8kJJQRI7C", "uri": "https://africanlii.org/sites/default/files/regulations/10856/media/10856.pdf", "label": "africanlii.org", "score": 10.8179330826, "published": false}, {"hash": "938mXtBhxto", "uri": "https://media.lawlibrary.org.za/files/legislation/akn-za-act-2002-57-eng-2016-05-01.pdf", "label": "media.lawlibrary.org.za", "score": 10.8042440414, "published": false}], "snippet_links": [{"key": "the-conditions", "type": "clause", "offset": [6, 20]}, {"key": "environmental-factors", "type": "clause", "offset": [66, 87]}, {"key": "a-community", "type": "clause", "offset": [139, 150]}], "hash": "f7ae74e7d0c9fab9edb1fa0d7e228d48", "id": 4}, {"size": 21, "snippet": "means a weakness of any nature that can be exploited by one or more threats. A vulnerability may be an omission or it may relate to a weakness in controls in terms of their strength, completeness or consistency and may be of a technical, procedural, physical, organisational or operational nature.", "samples": [{"hash": "bVW6gZ9pbdq", "uri": "https://www.euspa.europa.eu/sites/default/files/euspa-sec-ab-dec-a22114_security_rules_for_protecting_euci.pdf", "label": "www.euspa.europa.eu", "score": 11.5338811874, "published": false}, {"hash": "5ivgnR2VYj8", "uri": "https://www.legislation.gov.uk/eudn/2015/444/adopted/data.pdf", "label": "www.legislation.gov.uk", "score": 10.6468172073, "published": false}, {"hash": "3gBVOIJON0e", "uri": "https://www.legislation.gov.uk/cy/eudn/2015/444/data.pdf", "label": "www.legislation.gov.uk", "score": 10.5099248886, "published": false}], "snippet_links": [{"key": "relate-to", "type": "definition", "offset": [122, 131]}, {"key": "terms-of", "type": "definition", "offset": [158, 166]}, {"key": "a-technical", "type": "clause", "offset": [225, 236]}], "hash": "b5a7e61a8e583edef000d1f79246a597", "id": 5}, {"size": 14, "snippet": "means the readily apparent susceptibility of a victim to injury, physical restraint, persuasion, or temptation.", "samples": [{"hash": "3ONpf1UEbJ0", "uri": "https://ombudsman.legislature.mi.gov/documents/mcl/pdf/mcl-175-1927-XVII-4.pdf", "label": "ombudsman.legislature.mi.gov", "score": 18.1381587982, "published": false}, {"hash": "2dgwrWj9gya", "uri": "https://cdn.ymaws.com/aaml.org/resource/collection/F737C104-4B52-409B-8B2A-7B7BDD14A2AD/financial_exploitation_statutes-16-2.pdf", "label": "cdn.ymaws.com", "score": 10.3552360535, "published": false}, {"hash": "2sc4YihSYjh", "uri": "http://www.legislature.mi.gov/documents/2017-2018/publicact/pdf/2018-PA-0652.pdf", "label": "www.legislature.mi.gov", "score": 9.5106096268, "published": false}], "snippet_links": [{"key": "physical-restraint", "type": "clause", "offset": [65, 83]}], "hash": "4ee6c71769a70e661b4c34bfa143557d", "id": 6}, {"size": 14, "snippet": "\u2019 means the degree to which a system is susceptible to, or unable to cope with, adverse effects of climate change, including climate variability and extremes. 35", "samples": [{"hash": "5L1ENmG3FtK", "uri": "https://compliancelibrary.co.za/wp/wp-content/uploads/2024/08/Climate-Change-Act-22-of-2024-GoN-5050.pdf", "label": "Explanatory Note", "score": 23.5520172119, "published": false}, {"hash": "kLRZ8EEVGjM", "uri": "https://justshare.org.za/wp-content/uploads/2024/08/Climate-Change-Act-22-of-2024.pdf", "label": "justshare.org.za", "score": 19.3066539764, "published": false}, {"hash": "8RNmJY8L0Bf", "uri": "https://cer.org.za/wp-content/uploads/2024/07/Climate-Change-Act-22-of-2024.pdf", "label": "cer.org.za", "score": 17.4042854309, "published": false}], "snippet_links": [{"key": "adverse-effects-of-climate-change", "type": "definition", "offset": [80, 113]}], "hash": "6a68d5855cf03dd30d5e033bad9e31b8", "id": 7}, {"size": 10, "snippet": "means a set of conditions and processes rooted in conditions of physical, social, economic and environmental factors which increase the susceptibility of an individual or community to the impact of hazards; and", "samples": [{"hash": "hNOGzvs9FCG", "uri": "https://disasterlaw.ifrc.org/sites/default/files/media/disaster_law/2021-07/Namibia%20-%20Disaster%20Risk%20Management%20Act,%202012_0.pdf", "label": "Notice", "score": 14.2963724136, "published": false}, {"hash": "dd93tJEciTn", "uri": "https://namiblii.org/akn/na/act/2012/10/eng@2012-09-03/source", "label": "namiblii.org", "score": 11.637919426, "published": false}, {"hash": "gYCYbalocjo", "uri": "https://media.namiblii.org/files/legislation/akn-na-act-2012-10-eng-2012-09-03.pdf", "label": "media.namiblii.org", "score": 11.3477067947, "published": false}], "snippet_links": [{"key": "conditions-of", "type": "clause", "offset": [50, 63]}, {"key": "environmental-factors", "type": "clause", "offset": [95, 116]}, {"key": "an-individual", "type": "clause", "offset": [154, 167]}], "hash": "4d1388e0d095e1b7d1e9dbef7b8df34d", "id": 8}, {"size": 9, "snippet": "means any weakness in the implemented measures and procedures which could be exploited to carry out an act of unlawful interference.", "samples": [{"hash": "kRtZUVGCm7C", "uri": "https://www.legislation.gov.im/cms/images/LEGISLATION/SUBORDINATE/2024/2024-0120/2024-0120_1.pdf", "label": "www.legislation.gov.im", "score": 17.0837097168, "published": false}, {"hash": "7ZOh4byfuth", "uri": "http://tynwald.org.im/index.php/spfile?file=/business/opqp/sittings/20212026/2024-SD-0120.pdf", "label": "tynwald.org.im", "score": 16.8915100098, "published": false}, {"hash": "aKCVlhqmxb5", "uri": "http://cad.gov.rs/upload/regulativa/eng/COMMON%20RULES%20IN%20CIVIL%20AVIATION%20SECURITY.pdf", "label": "cad.gov.rs", "score": 10.4476385117, "published": false}], "snippet_links": [{"key": "and-procedures", "type": "clause", "offset": [47, 61]}, {"key": "an-act-of-unlawful-interference", "type": "definition", "offset": [100, 131]}], "hash": "fdc312943d1ecdf9cb9b5c4fa51d115c", "id": 9}, {"size": 9, "snippet": "means a condition in the instructions of the Software, whether consistent with its Specifications or not, that renders the computer on which the Software is operating susceptible to unauthorized access and use.", "samples": [{"hash": "iaf356ETxbD", "uri": "/contracts/iaf356ETxbD#vulnerability", "label": "Master Services and Software License Agreement (Amdocs LTD)", "score": 32.9472961426, "published": true}, {"hash": "djrP5AKSGnH", "uri": "/contracts/djrP5AKSGnH#vulnerability", "label": "Master Services and Software License Agreement (Amdocs LTD)", "score": 30.9370288849, "published": true}, {"hash": "f2mvSHvwsIm", "uri": "/contracts/f2mvSHvwsIm#vulnerability", "label": "Software and Professional Services Agreement (Amdocs LTD)", "score": 28.9425048828, "published": true}], "snippet_links": [{"key": "the-software", "type": "clause", "offset": [41, 53]}, {"key": "consistent-with", "type": "definition", "offset": [63, 78]}, {"key": "access-and-use", "type": "definition", "offset": [195, 209]}], "hash": "1e05f32f5f00f68b82734a4b4b71869d", "id": 10}], "next_curs": "CloSVGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjYLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIWdnVsbmVyYWJpbGl0eSMwMDAwMDAwYQyiAQJlbhgAIAA=", "definition": {"size": 609, "snippet": "means a weakness of an asset or mitigation that can be exploited by one or more threats.", "title": "Vulnerability", "id": "vulnerability", "examples": ["Siemens Energy does not represent, warrant or guarantee that the Supplies and Services will be secure from Cyberthreats or that they do not contain any <strong>Vulnerability</strong>."], "related": [["security-vulnerability", "Security Vulnerability", "Security <strong>Vulnerability</strong>"], ["vulnerable", "Vulnerable", "Vulnerable"], ["vulnerable-adult", "Vulnerable adult", "Vulnerable adult"], ["severity", "Severity", "Severity"], ["hacking", "Hacking", "Hacking"]], "related_snippets": [], "updated": "2026-01-31T04:25:49+00:00"}, "json": true, "cursor": ""}}