| Display title | Vulnerability assessment (computing) |
| Default sort key | Vulnerability assessment (computing) |
| Page length (in bytes) | 5,607 |
| Namespace ID | 0 |
| Page ID | 52505053 |
| Page content language | en - English |
| Page content model | wikitext |
| Indexing by robots | Allowed |
| Number of page watchers | Fewer than 30 watchers |
| Number of redirects to this page | 0 |
| Counted as a content page | Yes |
| Wikidata item ID | Q30689485 |
| Central description | process of defining, identifying and classifying the security holes in information technology systems |
| Page views in the past 30 days | |
| Edit | Allow all users (no expiry set) |
| Move | Allow all users (no expiry set) |
| Page creator | Azam.ikram (talk | contribs) |
| Date of page creation | 13:43, 7 December 2016 |
| Latest editor | J4ckCrash71 (talk | contribs) |
| Date of latest edit | 18:34, 30 September 2025 |
| Total number of edits | 21 |
| Recent number of edits (within past 30 days) | 0 |
| Recent number of distinct authors | 0 |
| Transcluded templates (18) | Pages transcluded onto the current version of this page (help):
|
| Wikidata entities used in this page | |