The most serious vulnerabilities are those in network software, especially if they exploit traffic that is allowed through the firewall like HTTP, for example exploiting a bug in a web browser.

The Open Source Vulnerability Database lists many vulnerabilities.

Last updated: 2007-12-02

Nearby terms:

xecuted. deriving from the common practice of pushing contracts that

Try this search on Wikipedia, OneLook, Google