Threat actors use vulnerabilities to launch their attacks. By exploiting vulnerabilities, attackers can gain access to systems, networks, and devices. Vulnerabilities enable attackers to steal and ransom sensitive and corporate information, as well as eavesdrop to confidential communication.
Vulnerabilities can be created as a result of software error, or as forced injections like SQL injection attacks and OS command injections. Other common vulnerability attacks are buffer and integer overflow, which involve the alteration of code by the attacker. Every day, more and more vulnerabilities are discovered. In 2019 alone, over 22,000 vulnerabilities were disclosed.