They are the ones that will allow the attacker to drop some kind of trojans in to any kind of software like adobe, Flash player, Microsoft .Net. Mostly, people with high level of expertise only can find these vulnerabilities and can access the code of the software and changes it.
Vulnerability |