From dfa644b09d28627bfbe67b14a205928f3b75a762 Mon Sep 17 00:00:00 2001 From: Michelle McAveety <135155059+mmcaveety@users.noreply.github.com> Date: Wed, 28 Jun 2023 16:22:47 -0400 Subject: [PATCH] Update content/software-security/glossary.md Co-authored-by: ltagliaferri --- content/software-security/glossary.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/software-security/glossary.md b/content/software-security/glossary.md index 8466e940a1..90b4bbcf18 100644 --- a/content/software-security/glossary.md +++ b/content/software-security/glossary.md @@ -43,7 +43,7 @@ An artifact is an immutable blob of data. Examples of artifacts include a file, ### Software vulnerability -A software vulnerability is a weakness in a program which if left unaddressed may be used by attackers to access, manipulate, or compromise a computer system. A vulnerability can impact various parts of a system depending on where or how it is introduced, and can be targeted through different vectors based on the type of weakness it introduces. Developers refer to vulnerabilities by their corresponding CVE ID when patching or remediating any known security flaws. +A software vulnerability is a weakness in a program which, if left unaddressed, may be used by attackers to access, manipulate, or compromise a computer system. A vulnerability can impact various parts of a system depending on where or how it is introduced, and can be targeted through different vectors based on the type of weakness it introduces. Developers refer to vulnerabilities by their corresponding CVE ID when patching or remediating any known security flaws. ---