I. Introduction
In the terms of security of computers, vulnerability is a flaw, which allows an assailant to decrease a system's information safety. A protection or safety risk may be classified as vulnerability. The risk tied to the vulnerabilities can have a possibility of momentous loss. Also there are vulnerabilities with no risk attached to them: when the pretentious asset has no value. The vulnerabilities which are accessible by the attackers and are exploited at one or some of the places are classified as the exploitable vulnerabilities. Basically, the vulnerability is the juncture of three fundamentals: system's incompetency or flaw, how attacker reacts to the flaw and the potential of an attacker i.e. he must be having a tool or technique that is tied to any of the limitation of our system. Here we are considering vulnerability to be a point in our website where attack can occur rapidly.