Exploit.474 worm attacks , it startscreatingsecurity vulnerabilities
unanticipated use of the application(passive) caused bysecurity vulnerabilities
to use parameter pollutionto triggersecurity vulnerabilities
The use of auto answercausessecurity vulnerabilities
As soon as Heias.js worm attacks , it startscreatingsecurity vulnerabilities
As soon as IDP.Trojan worm attacks , it startscreatingsecurity vulnerabilities
As soon as Win32 : Bifrose worm attacks , it startscreatingsecurity vulnerabilities
As soon as VirusDoctor!gen13 worm attacks , it startscreatingsecurity vulnerabilities
a flawed software design or gross negligence on the part of their manufacturers that all often use the same factory passwords for all their devices(passive) caused bysecurity vulnerabilities
a flawed software design or gross negligence on the part of their manufacturers , which will often use the same factory password for all their devices(passive) caused bysecurity vulnerabilities
out - of - date software in devices that range from webcams(passive) caused bysecurity vulnerabilities
out - of - date software in consumer IoT devices(passive) caused bysecurity vulnerabilities
Kaashoek Resin ... that helpspreventsecurity vulnerabilities
flaws in the design of speculative execution hardware in the computer 's CPU(passive) caused bysecurity vulnerabilities
Ability to read code in a wide variety of languagesdiscoversecurity vulnerabilities
However , a lot of web applications mix them up , causing bugs that are hard to troubleshoot , and , at worstcausingsecurity vulnerabilities
user installation of third - party software and devices already regulated by certain healthcare statutes.[6(passive) caused bysecurity vulnerabilities
outdated software and operating systems(passive) caused bySecurity vulnerabilities
after software is delivereddiscoveredafter software is delivered
in other software that we depend ondiscoveredin other software that we depend on
in any of the following softwarediscoveredin any of the following software
in software or hardwarediscoversin software or hardware
in the core softwarediscoveredin the core software
in our software products quickly with carediscoveredin our software products quickly with care
in commercial software packagesdiscoveredin commercial software packages
, in the software your business is built onare discovered, in the software your business is built on
a crisis for software to solvethiscan createa crisis for software to solvethis
in the NSA 's own softwarediscoveredin the NSA 's own software
from unsupported / unpatched softwareresultingfrom unsupported / unpatched software
in the software and obtaining a workarounddiscoveredin the software and obtaining a workaround
from the use of their coderesultingfrom the use of their code
from poor codecan resultfrom poor code
at the code leveloften originateat the code level
in your products or systems unmanaged codeare discoveredin your products or systems unmanaged code
in any software that we have published on our GitHub repositorydiscoveredin any software that we have published on our GitHub repository
since that time onwardsdiscoveredsince that time onwards
by out of date software on IoT devices in their homescausedby out of date software on IoT devices in their homes
in various versions of their individual softwarediscoveredin various versions of their individual software
in critical electrical and software systemsdiscoveredin critical electrical and software systems
for all pieces of software , including FOSSdiscovered regularlyfor all pieces of software , including FOSS
in their software which require urgent attentiondiscoveredin their software which require urgent attention
to the installation of rogue software on your PCcan leadto the installation of rogue software on your PC
in U.S. online and software systemsdiscoveredin U.S. online and software systems
to poor public perception of the softwareleadingto poor public perception of the software
in accounting procedures or in the bank ’s softwarediscoveredin accounting procedures or in the bank ’s software
from software bugs , weak passwords or software that ’s already been infected by a computer virus or script code injection close homecan resultfrom software bugs , weak passwords or software that ’s already been infected by a computer virus or script code injection close home
in any web services or other public facing software running on any of the following domains : btric.org and all subdomainsdiscoveredin any web services or other public facing software running on any of the following domains : btric.org and all subdomains
in any web services or other public facing software running on any of the following domains : eff.org and all subdomainsdiscoveredin any web services or other public facing software running on any of the following domains : eff.org and all subdomains
from weak passwords , software bugs , a computer virus , or other malware , or a script code injectionmay resultfrom weak passwords , software bugs , a computer virus , or other malware , or a script code injection
to Code Execution DoorsLeadsto Code Execution Doors
in the dotCMS code basediscoveredin the dotCMS code base
from old html coderesultingfrom old html code
in the UConnect entertainment system hardware and softwarediscoveredin the UConnect entertainment system hardware and software
within the firm 's suite of softwarediscoveredwithin the firm 's suite of software
to data breaches and downtimecould leadto data breaches and downtime
since that datediscoveredsince that date
to attacks and data breachesledto attacks and data breaches
in the content protection software contained on any such CDs through software updatesdiscoveredin the content protection software contained on any such CDs through software updates