When Vulnerability is used by an Attacker for an attack a Vulnerability is known as an Exploit
When an attack is successful and data is exposed, then this is a Breach or Data BreachVulnerability Assessments should yield a prioritized list of vulnerabilities that SHOULD be addressed for "proper" security.Penetration Tests are designed to achieve a specific, attacker-simulated goal and should be requested by customers who are already at their desired security posture.