Which of the following best describes a vulnerability?
A record of all security incidents that have occurred
An intentional feature added to the system for security purposes
A defensive measure protecting a system from threats
A weakness in a system that can be exploited by a threat